Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-24143 (GCVE-0-2025-24143)
Vulnerability from cvelistv5
Published
2025-01-27 21:46
Modified
2025-02-04 21:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- A maliciously crafted webpage may be able to fingerprint the user
Summary
The issue was addressed with improved access restrictions to the file system. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, visionOS 2.3. A maliciously crafted webpage may be able to fingerprint the user.
References
► | URL | Tags | |
---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-24143", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-28T19:38:50.531676Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-04T21:19:10.129Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "visionOS", "vendor": "Apple", "versions": [ { "lessThan": "2.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "macOS", "vendor": "Apple", "versions": [ { "lessThan": "15.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Safari", "vendor": "Apple", "versions": [ { "lessThan": "18.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "iOS and iPadOS", "vendor": "Apple", "versions": [ { "lessThan": "18.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved access restrictions to the file system. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, visionOS 2.3. A maliciously crafted webpage may be able to fingerprint the user." } ], "problemTypes": [ { "descriptions": [ { "description": "A maliciously crafted webpage may be able to fingerprint the user", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-27T21:46:05.639Z", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "url": "https://support.apple.com/en-us/122073" }, { "url": "https://support.apple.com/en-us/122068" }, { "url": "https://support.apple.com/en-us/122074" }, { "url": "https://support.apple.com/en-us/122066" } ] } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2025-24143", "datePublished": "2025-01-27T21:46:05.639Z", "dateReserved": "2025-01-17T00:00:44.975Z", "dateUpdated": "2025-02-04T21:19:10.129Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-24143\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2025-01-27T22:15:18.893\",\"lastModified\":\"2025-02-04T22:15:42.697\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The issue was addressed with improved access restrictions to the file system. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, visionOS 2.3. A maliciously crafted webpage may be able to fingerprint the user.\"},{\"lang\":\"es\",\"value\":\"El problema se solucion\u00f3 mejorando las restricciones de acceso al archivo sistema. Este problema se solucion\u00f3 en macOS Sequoia 15.3, Safari 18.3, iOS 18.3 y iPadOS 18.3, visionOS 2.3. Una p\u00e1gina web malintencionada manipulado puede tomar la huella digital del usuario.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-862\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"18.3\",\"matchCriteriaId\":\"0384B3A1-9447-4020-A798-38CB2348F67B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"18.3\",\"matchCriteriaId\":\"6B7F80FC-EB0A-4B78-8CB7-18E5F162CD6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.3\",\"matchCriteriaId\":\"38BA63B3-CC2C-4E63-AE2C-B8DB08B5E89B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.3\",\"matchCriteriaId\":\"F91BF3D5-D8E5-437C-8301-C9F22AAFB8BD\"}]}]}],\"references\":[{\"url\":\"https://support.apple.com/en-us/122066\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://support.apple.com/en-us/122068\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://support.apple.com/en-us/122073\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://support.apple.com/en-us/122074\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-24143\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-01-28T19:38:50.531676Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-862\", \"description\": \"CWE-862 Missing Authorization\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-01-28T19:38:44.528Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Apple\", \"product\": \"visionOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"2.3\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"macOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"15.3\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"Safari\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"18.3\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"iOS and iPadOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"18.3\", \"versionType\": \"custom\"}]}], \"references\": [{\"url\": \"https://support.apple.com/en-us/122073\"}, {\"url\": \"https://support.apple.com/en-us/122068\"}, {\"url\": \"https://support.apple.com/en-us/122074\"}, {\"url\": \"https://support.apple.com/en-us/122066\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"The issue was addressed with improved access restrictions to the file system. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, visionOS 2.3. A maliciously crafted webpage may be able to fingerprint the user.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"A maliciously crafted webpage may be able to fingerprint the user\"}]}], \"providerMetadata\": {\"orgId\": \"286789f9-fbc2-4510-9f9a-43facdede74c\", \"shortName\": \"apple\", \"dateUpdated\": \"2025-01-27T21:46:05.639Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2025-24143\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-04T21:19:10.129Z\", \"dateReserved\": \"2025-01-17T00:00:44.975Z\", \"assignerOrgId\": \"286789f9-fbc2-4510-9f9a-43facdede74c\", \"datePublished\": \"2025-01-27T21:46:05.639Z\", \"assignerShortName\": \"apple\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
rhsa-2025:2035
Vulnerability from csaf_redhat
Published
2025-03-03 12:34
Modified
2025-07-07 09:28
Summary
Red Hat Security Advisory: webkit2gtk3 security update
Notes
Topic
An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54543)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24162)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54543)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24162)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:2035", "url": "https://access.redhat.com/errata/RHSA-2025:2035" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2344619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344619" }, { "category": "external", "summary": "2344624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344624" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_2035.json" } ], "title": "Red Hat Security Advisory: webkit2gtk3 security update", "tracking": { "current_release_date": "2025-07-07T09:28:57+00:00", "generator": { "date": "2025-07-07T09:28:57+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.3" } }, "id": "RHSA-2025:2035", "initial_release_date": "2025-03-03T12:34:58+00:00", "revision_history": [ { "date": "2025-03-03T12:34:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-04-01T01:20:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-07-07T09:28:57+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.6-1.el9_5.src", "product": { "name": "webkit2gtk3-0:2.46.6-1.el9_5.src", "product_id": "webkit2gtk3-0:2.46.6-1.el9_5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.6-1.el9_5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.6-1.el9_5.aarch64", "product": { "name": "webkit2gtk3-0:2.46.6-1.el9_5.aarch64", "product_id": "webkit2gtk3-0:2.46.6-1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.6-1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.6-1.el9_5.aarch64", "product": { "name": "webkit2gtk3-devel-0:2.46.6-1.el9_5.aarch64", "product_id": "webkit2gtk3-devel-0:2.46.6-1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.6-1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.6-1.el9_5.aarch64", "product": { "name": "webkit2gtk3-jsc-0:2.46.6-1.el9_5.aarch64", "product_id": "webkit2gtk3-jsc-0:2.46.6-1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.6-1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.aarch64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.aarch64", "product_id": "webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.6-1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.6-1.el9_5.aarch64", "product": { "name": "webkit2gtk3-debugsource-0:2.46.6-1.el9_5.aarch64", "product_id": "webkit2gtk3-debugsource-0:2.46.6-1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.6-1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.aarch64", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.aarch64", "product_id": "webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.6-1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.aarch64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.aarch64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.6-1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.aarch64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.aarch64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.6-1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.aarch64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.aarch64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.6-1.el9_5?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.6-1.el9_5.ppc64le", "product": { "name": "webkit2gtk3-0:2.46.6-1.el9_5.ppc64le", "product_id": "webkit2gtk3-0:2.46.6-1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.6-1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.6-1.el9_5.ppc64le", "product": { "name": "webkit2gtk3-devel-0:2.46.6-1.el9_5.ppc64le", "product_id": "webkit2gtk3-devel-0:2.46.6-1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.6-1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.6-1.el9_5.ppc64le", "product": { "name": "webkit2gtk3-jsc-0:2.46.6-1.el9_5.ppc64le", "product_id": "webkit2gtk3-jsc-0:2.46.6-1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.6-1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.ppc64le", "product_id": "webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.6-1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.6-1.el9_5.ppc64le", "product": { "name": "webkit2gtk3-debugsource-0:2.46.6-1.el9_5.ppc64le", "product_id": "webkit2gtk3-debugsource-0:2.46.6-1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.6-1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.ppc64le", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.ppc64le", "product_id": "webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.6-1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.ppc64le", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.ppc64le", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.6-1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.ppc64le", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.ppc64le", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.6-1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.ppc64le", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.6-1.el9_5?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.6-1.el9_5.i686", "product": { "name": "webkit2gtk3-0:2.46.6-1.el9_5.i686", "product_id": "webkit2gtk3-0:2.46.6-1.el9_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.6-1.el9_5?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.6-1.el9_5.i686", "product": { "name": "webkit2gtk3-devel-0:2.46.6-1.el9_5.i686", "product_id": "webkit2gtk3-devel-0:2.46.6-1.el9_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.6-1.el9_5?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.6-1.el9_5.i686", "product": { "name": "webkit2gtk3-jsc-0:2.46.6-1.el9_5.i686", "product_id": "webkit2gtk3-jsc-0:2.46.6-1.el9_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.6-1.el9_5?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.i686", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.i686", "product_id": "webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.6-1.el9_5?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.6-1.el9_5.i686", "product": { "name": "webkit2gtk3-debugsource-0:2.46.6-1.el9_5.i686", "product_id": "webkit2gtk3-debugsource-0:2.46.6-1.el9_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.6-1.el9_5?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.i686", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.i686", "product_id": "webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.6-1.el9_5?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.i686", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.i686", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.6-1.el9_5?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.i686", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.i686", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.6-1.el9_5?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.i686", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.i686", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.6-1.el9_5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.6-1.el9_5.x86_64", "product": { "name": "webkit2gtk3-0:2.46.6-1.el9_5.x86_64", "product_id": "webkit2gtk3-0:2.46.6-1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.6-1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.6-1.el9_5.x86_64", "product": { "name": "webkit2gtk3-devel-0:2.46.6-1.el9_5.x86_64", "product_id": "webkit2gtk3-devel-0:2.46.6-1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.6-1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.6-1.el9_5.x86_64", "product": { "name": "webkit2gtk3-jsc-0:2.46.6-1.el9_5.x86_64", "product_id": "webkit2gtk3-jsc-0:2.46.6-1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.6-1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.x86_64", "product_id": "webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.6-1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.6-1.el9_5.x86_64", "product": { "name": "webkit2gtk3-debugsource-0:2.46.6-1.el9_5.x86_64", "product_id": "webkit2gtk3-debugsource-0:2.46.6-1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.6-1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.x86_64", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.x86_64", "product_id": "webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.6-1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.x86_64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.x86_64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.6-1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.x86_64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.x86_64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.6-1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.x86_64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.6-1.el9_5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.6-1.el9_5.s390x", "product": { "name": "webkit2gtk3-0:2.46.6-1.el9_5.s390x", "product_id": "webkit2gtk3-0:2.46.6-1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.6-1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.6-1.el9_5.s390x", "product": { "name": "webkit2gtk3-devel-0:2.46.6-1.el9_5.s390x", "product_id": "webkit2gtk3-devel-0:2.46.6-1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.6-1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.6-1.el9_5.s390x", "product": { "name": "webkit2gtk3-jsc-0:2.46.6-1.el9_5.s390x", "product_id": "webkit2gtk3-jsc-0:2.46.6-1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.6-1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.s390x", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.s390x", "product_id": "webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.6-1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.6-1.el9_5.s390x", "product": { "name": "webkit2gtk3-debugsource-0:2.46.6-1.el9_5.s390x", "product_id": "webkit2gtk3-debugsource-0:2.46.6-1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.6-1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.s390x", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.s390x", "product_id": "webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.6-1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.s390x", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.s390x", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.6-1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.s390x", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.s390x", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.6-1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.s390x", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.s390x", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.6-1.el9_5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.6-1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.aarch64" }, "product_reference": "webkit2gtk3-0:2.46.6-1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.6-1.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.i686" }, "product_reference": "webkit2gtk3-0:2.46.6-1.el9_5.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.6-1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.ppc64le" }, "product_reference": "webkit2gtk3-0:2.46.6-1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.6-1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.s390x" }, "product_reference": "webkit2gtk3-0:2.46.6-1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.6-1.el9_5.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.src" }, "product_reference": "webkit2gtk3-0:2.46.6-1.el9_5.src", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.6-1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.x86_64" }, "product_reference": "webkit2gtk3-0:2.46.6-1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.aarch64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.i686" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.ppc64le" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.s390x" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.x86_64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.6-1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.aarch64" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.6-1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.6-1.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.i686" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.6-1.el9_5.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.6-1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.ppc64le" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.6-1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.6-1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.s390x" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.6-1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.6-1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.x86_64" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.6-1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.6-1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.aarch64" }, "product_reference": "webkit2gtk3-devel-0:2.46.6-1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.6-1.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.i686" }, "product_reference": "webkit2gtk3-devel-0:2.46.6-1.el9_5.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.6-1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.ppc64le" }, "product_reference": "webkit2gtk3-devel-0:2.46.6-1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.6-1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.s390x" }, "product_reference": "webkit2gtk3-devel-0:2.46.6-1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.6-1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.x86_64" }, "product_reference": "webkit2gtk3-devel-0:2.46.6-1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.aarch64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.i686" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.ppc64le" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.s390x" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.x86_64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.6-1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.aarch64" }, "product_reference": "webkit2gtk3-jsc-0:2.46.6-1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.6-1.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.i686" }, "product_reference": "webkit2gtk3-jsc-0:2.46.6-1.el9_5.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.6-1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.ppc64le" }, "product_reference": "webkit2gtk3-jsc-0:2.46.6-1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.6-1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.s390x" }, "product_reference": "webkit2gtk3-jsc-0:2.46.6-1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.6-1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.x86_64" }, "product_reference": "webkit2gtk3-jsc-0:2.46.6-1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.aarch64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.i686" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.ppc64le" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.s390x" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.x86_64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.aarch64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.i686" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.s390x" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.aarch64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.i686" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.s390x" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-54543", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2025-02-10T09:37:24.253576+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344619" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause memory corruption due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.src", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54543" }, { "category": "external", "summary": "RHBZ#2344619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54543", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54543" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2025-01-27T21:46:30.578000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-03-03T12:34:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.src", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:2035" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.src", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.src", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2025-24162", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2025-02-10T09:44:11.167306+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344624" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper state management.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.\n\nThis issue can cause an unexpected process crash. Additionally, there is no evidence of remote code execution but this possibility is not discarded.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.src", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24162" }, { "category": "external", "summary": "RHBZ#2344624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344624" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24162", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24162" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24162", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24162" }, { "category": "external", "summary": "https://support.apple.com/en-us/122066", "url": "https://support.apple.com/en-us/122066" }, { "category": "external", "summary": "https://support.apple.com/en-us/122068", "url": "https://support.apple.com/en-us/122068" }, { "category": "external", "summary": "https://support.apple.com/en-us/122071", "url": "https://support.apple.com/en-us/122071" }, { "category": "external", "summary": "https://support.apple.com/en-us/122072", "url": "https://support.apple.com/en-us/122072" }, { "category": "external", "summary": "https://support.apple.com/en-us/122073", "url": "https://support.apple.com/en-us/122073" }, { "category": "external", "summary": "https://support.apple.com/en-us/122074", "url": "https://support.apple.com/en-us/122074" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0001.html", "url": "https://webkitgtk.org/security/WSA-2025-0001.html" } ], "release_date": "2025-01-27T21:45:54.015000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-03-03T12:34:58+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.src", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:2035" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.src", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.src", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.6-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el9_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash" } ] }
rhsa-2025:2034
Vulnerability from csaf_redhat
Published
2025-03-03 12:39
Modified
2025-07-07 09:29
Summary
Red Hat Security Advisory: webkit2gtk3 security update
Notes
Topic
An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54543)
* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2025-24143)
* webkitgtk: Copying a URL from Web Inspector may lead to command injection (CVE-2025-24150)
* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2025-24158)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24162)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54543)\n\n* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2025-24143)\n\n* webkitgtk: Copying a URL from Web Inspector may lead to command injection (CVE-2025-24150)\n\n* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2025-24158)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24162)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:2034", "url": "https://access.redhat.com/errata/RHSA-2025:2034" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2344619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344619" }, { "category": "external", "summary": "2344621", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344621" }, { "category": "external", "summary": "2344622", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344622" }, { "category": "external", "summary": "2344623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344623" }, { "category": "external", "summary": "2344624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344624" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_2034.json" } ], "title": "Red Hat Security Advisory: webkit2gtk3 security update", "tracking": { "current_release_date": "2025-07-07T09:29:05+00:00", "generator": { "date": "2025-07-07T09:29:05+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.3" } }, "id": "RHSA-2025:2034", "initial_release_date": "2025-03-03T12:39:23+00:00", "revision_history": [ { "date": "2025-03-03T12:39:23+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-03-03T12:39:23+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-07-07T09:29:05+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.6-1.el8_10.src", "product": { "name": "webkit2gtk3-0:2.46.6-1.el8_10.src", "product_id": "webkit2gtk3-0:2.46.6-1.el8_10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.6-1.el8_10?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.6-1.el8_10.aarch64", "product": { "name": "webkit2gtk3-0:2.46.6-1.el8_10.aarch64", "product_id": "webkit2gtk3-0:2.46.6-1.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.6-1.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.6-1.el8_10.aarch64", "product": { "name": "webkit2gtk3-devel-0:2.46.6-1.el8_10.aarch64", "product_id": "webkit2gtk3-devel-0:2.46.6-1.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.6-1.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.6-1.el8_10.aarch64", "product": { "name": "webkit2gtk3-jsc-0:2.46.6-1.el8_10.aarch64", "product_id": "webkit2gtk3-jsc-0:2.46.6-1.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.6-1.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.aarch64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.aarch64", "product_id": "webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.6-1.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.6-1.el8_10.aarch64", "product": { "name": "webkit2gtk3-debugsource-0:2.46.6-1.el8_10.aarch64", "product_id": "webkit2gtk3-debugsource-0:2.46.6-1.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.6-1.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.aarch64", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.aarch64", "product_id": "webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.6-1.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.6-1.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.aarch64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.aarch64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.6-1.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.6-1.el8_10?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.6-1.el8_10.ppc64le", "product": { "name": "webkit2gtk3-0:2.46.6-1.el8_10.ppc64le", "product_id": "webkit2gtk3-0:2.46.6-1.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.6-1.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.6-1.el8_10.ppc64le", "product": { "name": "webkit2gtk3-devel-0:2.46.6-1.el8_10.ppc64le", "product_id": "webkit2gtk3-devel-0:2.46.6-1.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.6-1.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.6-1.el8_10.ppc64le", "product": { "name": "webkit2gtk3-jsc-0:2.46.6-1.el8_10.ppc64le", "product_id": "webkit2gtk3-jsc-0:2.46.6-1.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.6-1.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.ppc64le", "product_id": "webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.6-1.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.6-1.el8_10.ppc64le", "product": { "name": "webkit2gtk3-debugsource-0:2.46.6-1.el8_10.ppc64le", "product_id": "webkit2gtk3-debugsource-0:2.46.6-1.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.6-1.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.ppc64le", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.ppc64le", "product_id": "webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.6-1.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.6-1.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.ppc64le", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.ppc64le", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.6-1.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.6-1.el8_10?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.6-1.el8_10.i686", "product": { "name": "webkit2gtk3-0:2.46.6-1.el8_10.i686", "product_id": "webkit2gtk3-0:2.46.6-1.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.6-1.el8_10?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.6-1.el8_10.i686", "product": { "name": "webkit2gtk3-devel-0:2.46.6-1.el8_10.i686", "product_id": "webkit2gtk3-devel-0:2.46.6-1.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.6-1.el8_10?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.6-1.el8_10.i686", "product": { "name": "webkit2gtk3-jsc-0:2.46.6-1.el8_10.i686", "product_id": "webkit2gtk3-jsc-0:2.46.6-1.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.6-1.el8_10?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.i686", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.i686", "product_id": "webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.6-1.el8_10?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.6-1.el8_10.i686", "product": { "name": "webkit2gtk3-debugsource-0:2.46.6-1.el8_10.i686", "product_id": "webkit2gtk3-debugsource-0:2.46.6-1.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.6-1.el8_10?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.i686", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.i686", "product_id": "webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.6-1.el8_10?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.i686", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.i686", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.6-1.el8_10?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.i686", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.i686", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.6-1.el8_10?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.i686", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.i686", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.6-1.el8_10?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.6-1.el8_10.x86_64", "product": { "name": "webkit2gtk3-0:2.46.6-1.el8_10.x86_64", "product_id": "webkit2gtk3-0:2.46.6-1.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.6-1.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.6-1.el8_10.x86_64", "product": { "name": "webkit2gtk3-devel-0:2.46.6-1.el8_10.x86_64", "product_id": "webkit2gtk3-devel-0:2.46.6-1.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.6-1.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.6-1.el8_10.x86_64", "product": { "name": "webkit2gtk3-jsc-0:2.46.6-1.el8_10.x86_64", "product_id": "webkit2gtk3-jsc-0:2.46.6-1.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.6-1.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.x86_64", "product_id": "webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.6-1.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.6-1.el8_10.x86_64", "product": { "name": "webkit2gtk3-debugsource-0:2.46.6-1.el8_10.x86_64", "product_id": "webkit2gtk3-debugsource-0:2.46.6-1.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.6-1.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.x86_64", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.x86_64", "product_id": "webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.6-1.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.x86_64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.x86_64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.6-1.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.x86_64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.x86_64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.6-1.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.x86_64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.6-1.el8_10?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.6-1.el8_10.s390x", "product": { "name": "webkit2gtk3-0:2.46.6-1.el8_10.s390x", "product_id": "webkit2gtk3-0:2.46.6-1.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.6-1.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.6-1.el8_10.s390x", "product": { "name": "webkit2gtk3-devel-0:2.46.6-1.el8_10.s390x", "product_id": "webkit2gtk3-devel-0:2.46.6-1.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.6-1.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.6-1.el8_10.s390x", "product": { "name": "webkit2gtk3-jsc-0:2.46.6-1.el8_10.s390x", "product_id": "webkit2gtk3-jsc-0:2.46.6-1.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.6-1.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.s390x", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.s390x", "product_id": "webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.6-1.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.6-1.el8_10.s390x", "product": { "name": "webkit2gtk3-debugsource-0:2.46.6-1.el8_10.s390x", "product_id": "webkit2gtk3-debugsource-0:2.46.6-1.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.6-1.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.s390x", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.s390x", "product_id": "webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.6-1.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.6-1.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.s390x", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.s390x", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.6-1.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.6-1.el8_10?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.aarch64" }, "product_reference": "webkit2gtk3-0:2.46.6-1.el8_10.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.i686" }, "product_reference": "webkit2gtk3-0:2.46.6-1.el8_10.i686", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.ppc64le" }, "product_reference": "webkit2gtk3-0:2.46.6-1.el8_10.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.s390x" }, "product_reference": "webkit2gtk3-0:2.46.6-1.el8_10.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.6-1.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.src" }, "product_reference": "webkit2gtk3-0:2.46.6-1.el8_10.src", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.x86_64" }, "product_reference": "webkit2gtk3-0:2.46.6-1.el8_10.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.aarch64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.i686" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.i686", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.ppc64le" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.s390x" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.x86_64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.aarch64" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.6-1.el8_10.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.i686" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.6-1.el8_10.i686", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.ppc64le" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.6-1.el8_10.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.s390x" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.6-1.el8_10.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.x86_64" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.6-1.el8_10.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.aarch64" }, "product_reference": "webkit2gtk3-devel-0:2.46.6-1.el8_10.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.i686" }, "product_reference": "webkit2gtk3-devel-0:2.46.6-1.el8_10.i686", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.ppc64le" }, "product_reference": "webkit2gtk3-devel-0:2.46.6-1.el8_10.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.s390x" }, "product_reference": "webkit2gtk3-devel-0:2.46.6-1.el8_10.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.x86_64" }, "product_reference": "webkit2gtk3-devel-0:2.46.6-1.el8_10.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.aarch64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.i686" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.i686", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.s390x" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.x86_64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.aarch64" }, "product_reference": "webkit2gtk3-jsc-0:2.46.6-1.el8_10.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.i686" }, "product_reference": "webkit2gtk3-jsc-0:2.46.6-1.el8_10.i686", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.ppc64le" }, "product_reference": "webkit2gtk3-jsc-0:2.46.6-1.el8_10.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.s390x" }, "product_reference": "webkit2gtk3-jsc-0:2.46.6-1.el8_10.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.x86_64" }, "product_reference": "webkit2gtk3-jsc-0:2.46.6-1.el8_10.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.aarch64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.i686" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.i686", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.ppc64le" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.s390x" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.x86_64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.aarch64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.i686" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.i686", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.s390x" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.aarch64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.i686" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.i686", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.s390x" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-54543", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2025-02-10T09:37:24.253576+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344619" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause memory corruption due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54543" }, { "category": "external", "summary": "RHBZ#2344619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54543", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54543" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2025-01-27T21:46:30.578000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-03-03T12:39:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:2034" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2025-24143", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "discovery_date": "2025-02-10T09:40:08.138428+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344621" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. A maliciously crafted web page may be able to fingerprint the user due to improper access restrictions to the file system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into visiting a maliciously crafted web page.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24143" }, { "category": "external", "summary": "RHBZ#2344621", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344621" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24143", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24143" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24143", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24143" }, { "category": "external", "summary": "https://support.apple.com/en-us/122066", "url": "https://support.apple.com/en-us/122066" }, { "category": "external", "summary": "https://support.apple.com/en-us/122068", "url": "https://support.apple.com/en-us/122068" }, { "category": "external", "summary": "https://support.apple.com/en-us/122073", "url": "https://support.apple.com/en-us/122073" }, { "category": "external", "summary": "https://support.apple.com/en-us/122074", "url": "https://support.apple.com/en-us/122074" } ], "release_date": "2025-01-27T21:46:05.639000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-03-03T12:39:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:2034" }, { "category": "workaround", "details": "Do not visit untrusted web pages or load untrusted web content with WebKitGTK.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user" }, { "cve": "CVE-2025-24150", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2025-02-10T09:41:46.644580+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344622" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Copying a URL from Web Inspector may lead to command injection due to improper file handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Copying a URL from Web Inspector may lead to command injection", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into performing unlikely actions, such as enabling and opening the web inspector in an application and loading malicious web content into it. For this reason, this flaw has been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24150" }, { "category": "external", "summary": "RHBZ#2344622", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344622" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24150", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24150" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24150", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24150" }, { "category": "external", "summary": "https://support.apple.com/en-us/122066", "url": "https://support.apple.com/en-us/122066" }, { "category": "external", "summary": "https://support.apple.com/en-us/122068", "url": "https://support.apple.com/en-us/122068" }, { "category": "external", "summary": "https://support.apple.com/en-us/122074", "url": "https://support.apple.com/en-us/122074" } ], "release_date": "2025-01-27T21:46:32.259000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-03-03T12:39:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:2034" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Copying a URL from Web Inspector may lead to command injection" }, { "cve": "CVE-2025-24158", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2025-02-10T09:43:02.859455+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344623" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a denial of service due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to a denial-of-service", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24158" }, { "category": "external", "summary": "RHBZ#2344623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344623" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24158", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24158" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24158", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24158" }, { "category": "external", "summary": "https://support.apple.com/en-us/122066", "url": "https://support.apple.com/en-us/122066" }, { "category": "external", "summary": "https://support.apple.com/en-us/122068", "url": "https://support.apple.com/en-us/122068" }, { "category": "external", "summary": "https://support.apple.com/en-us/122071", "url": "https://support.apple.com/en-us/122071" }, { "category": "external", "summary": "https://support.apple.com/en-us/122072", "url": "https://support.apple.com/en-us/122072" }, { "category": "external", "summary": "https://support.apple.com/en-us/122073", "url": "https://support.apple.com/en-us/122073" }, { "category": "external", "summary": "https://support.apple.com/en-us/122074", "url": "https://support.apple.com/en-us/122074" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0001.html", "url": "https://webkitgtk.org/security/WSA-2025-0001.html" } ], "release_date": "2025-01-27T21:45:49.015000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-03-03T12:39:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:2034" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing web content may lead to a denial-of-service" }, { "cve": "CVE-2025-24162", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2025-02-10T09:44:11.167306+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344624" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper state management.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.\n\nThis issue can cause an unexpected process crash. Additionally, there is no evidence of remote code execution but this possibility is not discarded.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24162" }, { "category": "external", "summary": "RHBZ#2344624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344624" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24162", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24162" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24162", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24162" }, { "category": "external", "summary": "https://support.apple.com/en-us/122066", "url": "https://support.apple.com/en-us/122066" }, { "category": "external", "summary": "https://support.apple.com/en-us/122068", "url": "https://support.apple.com/en-us/122068" }, { "category": "external", "summary": "https://support.apple.com/en-us/122071", "url": "https://support.apple.com/en-us/122071" }, { "category": "external", "summary": "https://support.apple.com/en-us/122072", "url": "https://support.apple.com/en-us/122072" }, { "category": "external", "summary": "https://support.apple.com/en-us/122073", "url": "https://support.apple.com/en-us/122073" }, { "category": "external", "summary": "https://support.apple.com/en-us/122074", "url": "https://support.apple.com/en-us/122074" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0001.html", "url": "https://webkitgtk.org/security/WSA-2025-0001.html" } ], "release_date": "2025-01-27T21:45:54.015000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-03-03T12:39:23+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:2034" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.6-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.6-1.el8_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash" } ] }
rhsa-2025:10364
Vulnerability from csaf_redhat
Published
2025-07-07 02:28
Modified
2025-07-16 14:44
Summary
Red Hat Security Advisory: webkitgtk4 security update
Notes
Topic
An update for webkitgtk4 is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
WebKitGTK+ is port of the WebKit portable web rendering engine to the GTK+ platform. These packages provide WebKitGTK+ for GTK+ 3.
Security Fix(es):
* webkitgtk: Command injection in web inspector (CVE-2020-9862)
* webkitgtk: Use-after-free may lead to application termination or arbitrary code execution (CVE-2020-9893)
* webkitgtk: Out-of-bounds read may lead to unexpected application termination or arbitrary code execution (CVE-2020-9894)
* webkitgtk: Use-after-free may lead to application termination or arbitrary code execution (CVE-2020-9895)
* webkitgtk: Access issue in content security policy (CVE-2020-9915)
* webkitgtk: A logic issue may lead to cross site scripting (CVE-2020-9925)
* webkitgtk: Logic issue may lead to arbitrary code execution (CVE-2020-9802)
* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9803)
* webkitgtk: Logic issue may lead to cross site scripting (CVE-2020-9805)
* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9806)
* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9807)
* webkitgtk: Input validation issue may lead to cross site scripting (CVE-2020-9843)
* webkitgtk: Logic issue may lead to arbitrary code execution (CVE-2020-9850)
* webkitgtk: Improper access management to CLONE_NEWUSER and the TIOCSTI ioctl (CVE-2020-13753)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584)
* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951)
* webkitgtk: input validation issue may lead to a cross site scripting (CVE-2020-9952)
* webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543)
* webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918)
* webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623)
* webkitgtk: use after free issue may lead to arbitrary code execution (CVE-2020-9947)
* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765)
* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789)
* webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799)
* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801)
* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844)
* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871)
* webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806)
* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-1817)
* webkitgtk: Memory initialization issue possibly leading to memory disclosure (CVE-2021-1820)
* webkitgtk: Input validation issue leading to cross site scripting attack (CVE-2021-1825)
* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-1826)
* webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775)
* webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30661)
* webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663)
* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665)
* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2021-30666)
* webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682)
* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689)
* webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734)
* webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749)
* webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758)
* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30761)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30762)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795)
* webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799)
* webkitgtk: limited sandbox escape via VFS syscalls (CVE-2021-42762)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30846)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30848)
* webkitgtk: Multiple memory corruption issue leading to arbitrary code execution (CVE-2021-30849)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30851)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30809)
* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-30818)
* webkitgtk: Logic issue leading to HSTS bypass (CVE-2021-30823)
* webkitgtk: Out-of-bounds read leading to memory disclosure (CVE-2021-30836)
* webkitgtk: CSS compositing issue leading to revealing of the browsing history (CVE-2021-30884)
* webkitgtk: Logic issue leading to Content Security Policy bypass (CVE-2021-30887)
* webkitgtk: Information leak via Content Security Policy reports (CVE-2021-30888)
* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2021-30889)
* webkitgtk: Logic issue leading to universal cross-site scripting (CVE-2021-30890)
* chromium-browser: Inappropriate implementation in Navigation (CVE-2022-0108)
* webkitgtk: Cross-origin data exfiltration via resource timing API (CVE-2021-30897)
* webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create (CVE-2021-45481)
* webkitgtk: use-after-free in WebCore::ContainerNode::firstChild (CVE-2021-45482)
* webkitgtk: use-after-free in WebCore::Frame::page (CVE-2021-45483)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30934)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30936)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30951)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30952)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30953)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30954)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30984)
* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2022-22594)
* webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript (CVE-2022-22589)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-22590)
* webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2022-22592)
* webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free (CVE-2022-22620)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628)
* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629)
* webkitgtk: logic issue was addressed with improved state management (CVE-2022-22637)
* webkitgtk: heap-buffer-overflow in WebCore::TextureMapperLayer::setContentsLayer (CVE-2022-30294)
* webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719)
* webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662)
* webkitgtk: the video in a webRTC call may be interrupted if the audio capture gets interrupted (CVE-2022-22677)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710)
* webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32893)
* webkitgtk: buffer overflow issue was addressed with improved memory handling (CVE-2022-32886)
* webkitgtk: out-of-bounds read was addressed with improved bounds checking (CVE-2022-32912)
* webkitgtk: UI spoofing while Visiting a website that frames malicious content (CVE-2022-32891)
* webkitgtk: out-of-bounds write issue was addressed with improved bounds checking (CVE-2022-32888)
* webkitgtk: correctness issue in the JIT was addressed with improved checks (CVE-2022-32923)
* webkitgtk: issue was addressed with improved UI handling (CVE-2022-42799)
* webkitgtk: sensitive information disclosure issue (CVE-2022-42824)
* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2022-42823)
* webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution (CVE-2022-42856)
* webkitgtk: memory disclosure issue was addressed with improved memory handling (CVE-2022-42852)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-42863)
* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42867)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46691)
* webkitgtk: Same Origin Policy bypass issue (CVE-2022-46692)
* webkitgtk: logic issue leading to user information disclosure (CVE-2022-46698)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46699)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46700)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23518)
* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42826)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23517)
* webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution (CVE-2023-23529)
* webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild() (CVE-2023-25358)
* WebKitGTK: use-after-free leads to arbitrary code execution (CVE-2023-28205)
* webkitgtk: an out-of-bounds read when processing malicious content (CVE-2023-28204)
* webkitgtk: a use-after-free when processing maliciously crafted web content (CVE-2023-32373)
* webkitgtk: improper bounds checking leading to arbitrary code execution (CVE-2022-48503)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-32435)
* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2023-32439)
* webkitgtk: arbitrary code execution (CVE-2023-37450)
* webkitgtk: arbitrary code execution (CVE-2023-32393)
* webkitgtk: disclose sensitive information (CVE-2023-38133)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-38592)
* webkitgtk: arbitrary code execution (CVE-2023-38594)
* webkitgtk: arbitrary code execution (CVE-2023-38595)
* webkitgtk: track sensitive user information (CVE-2023-38599)
* webkitgtk: arbitrary code execution (CVE-2023-38600)
* webkitgtk: arbitrary code execution (CVE-2023-38611)
* webkitgtk: bypass Same Origin Policy (CVE-2023-38572)
* webkitgtk: arbitrary code execution (CVE-2023-38597)
* webkitgtk: Memory corruption issue when processing web content (CVE-2022-32885)
* webkitgtk: Same Origin Policy bypass via crafted web content (CVE-2023-27932)
* webkitgtk: Website may be able to track sensitive user information (CVE-2023-27954)
* webkitgtk: use after free vulnerability (CVE-2023-28198)
* webkitgtk: content security policy blacklist failure (CVE-2023-32370)
* webkitgtk: arbitrary javascript code execution (CVE-2023-40397)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32792)
* webkitgtk: malicious content may lead to UI spoofing (CVE-2022-32816)
* webkitgtk: processing malicious web content may lead to arbitrary code execution (CVE-2023-41993)
* webkitgtk: use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports (CVE-2023-39928)
* webkitgtk: processing web content may lead to arbitrary code execution (CVE-2023-35074)
* webkitgtk: attacker with JavaScript execution may be able to execute arbitrary code (CVE-2023-40451)
* webkitgtk: processing web content may lead to arbitrary code execution (CVE-2023-41074)
* webkitgtk: Out-of-bounds read leads to sensitive data leak (CVE-2023-42916)
* webkitgtk: Arbitrary Remote Code Execution (CVE-2023-42917)
* webkitgtk: processing a malicious image may lead to a denial of service (CVE-2023-42883)
* webkitgtk: processing malicious web content may lead to arbitrary code execution (CVE-2023-42890)
* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2024-23222)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-23213)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-40414)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42833)
* webkitgtk: Processing a file may lead to a denial of service or potentially disclose memory contents (CVE-2014-1745)
* webkit: processing malicious web content may lead to denial-of-service (CVE-2024-23252)
* webkit: malicious website may exfiltrate audio data cross-origin (CVE-2024-23254)
* webkit: processing malicious web content prevents Content Security Policy from being enforced (CVE-2024-23263)
* webkit: maliciously crafted webpage may be able to fingerprint the user (CVE-2024-23280)
* webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced (CVE-2024-23284)
* webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing. (CVE-2022-32919)
* webkitgtk: A website may able to track visited websites in private browsing (CVE-2022-32933)
* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2022-46705)
* webkitgtk: Visiting a malicious website may lead to address bar spoofing. (CVE-2022-46725)
* webkitgtk: User password may be read aloud by a text-to-speech accessibility feature (CVE-2023-32359)
* webkitgtk: Processing web content may lead to a denial of service (CVE-2023-41983)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42852)
* webkit: visiting a malicious website may lead to address bar spoofing (CVE-2023-42843)
* webkit: heap use-after-free may lead to arbitrary code execution (CVE-2023-42950)
* webkit: processing malicious web content may lead to a denial of service (CVE-2023-42956)
* chromium-browser: Use after free in ANGLE (CVE-2024-4558)
* webkit: pointer authentication bypass (CVE-2024-27834)
* webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)
* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)
* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)
* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)
* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2024-40866)
* webkitgtk: A malicious website may cause unexpected cross-origin behavior (CVE-2024-23271)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27808)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27833)
* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2024-27838)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)
* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-44187)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44185)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44244)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2024-44296)
* webkitgtk: data isolation bypass vulnerability (CVE-2024-44309)
* webkitgtk: javascriptcore: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-44308)
* WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54479)
* webkit: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54502)
* webkit: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54505)
* webkit: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54508)
* webkit: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54534)
* webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution (CVE-2024-27856)
* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54543)
* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2025-24143)
* webkitgtk: Copying a URL from Web Inspector may lead to command injection (CVE-2025-24150)
* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2025-24158)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24162)
* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54658)
* webkitgtk: out-of-bounds write vulnerability (CVE-2025-24201)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44192)
* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-54467)
* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54551)
* webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack (CVE-2025-24208)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24209)
* webkitgtk: A type confusion issue could lead to memory corruption (CVE-2025-24213)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24216)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24264)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-30427)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42875)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42970)
* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-24223)
* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-31204)
* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2025-31205)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-31206)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-31215)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-31257)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for webkitgtk4 is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "WebKitGTK+ is port of the WebKit portable web rendering engine to the GTK+ platform. These packages provide WebKitGTK+ for GTK+ 3.\n\nSecurity Fix(es):\n\n* webkitgtk: Command injection in web inspector (CVE-2020-9862)\n\n* webkitgtk: Use-after-free may lead to application termination or arbitrary code execution (CVE-2020-9893)\n\n* webkitgtk: Out-of-bounds read may lead to unexpected application termination or arbitrary code execution (CVE-2020-9894)\n\n* webkitgtk: Use-after-free may lead to application termination or arbitrary code execution (CVE-2020-9895)\n\n* webkitgtk: Access issue in content security policy (CVE-2020-9915)\n\n* webkitgtk: A logic issue may lead to cross site scripting (CVE-2020-9925)\n\n* webkitgtk: Logic issue may lead to arbitrary code execution (CVE-2020-9802)\n\n* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9803)\n\n* webkitgtk: Logic issue may lead to cross site scripting (CVE-2020-9805)\n\n* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9806)\n\n* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9807)\n\n* webkitgtk: Input validation issue may lead to cross site scripting (CVE-2020-9843)\n\n* webkitgtk: Logic issue may lead to arbitrary code execution (CVE-2020-9850)\n\n* webkitgtk: Improper access management to CLONE_NEWUSER and the TIOCSTI ioctl (CVE-2020-13753)\n\n* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584)\n\n* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948)\n\n* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951)\n\n* webkitgtk: input validation issue may lead to a cross site scripting (CVE-2020-9952)\n\n* webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983)\n\n* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543)\n\n* webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918)\n\n* webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623)\n\n* webkitgtk: use after free issue may lead to arbitrary code execution (CVE-2020-9947)\n\n* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765)\n\n* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789)\n\n* webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799)\n\n* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801)\n\n* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844)\n\n* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871)\n\n* webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806)\n\n* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-1817)\n\n* webkitgtk: Memory initialization issue possibly leading to memory disclosure (CVE-2021-1820)\n\n* webkitgtk: Input validation issue leading to cross site scripting attack (CVE-2021-1825)\n\n* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-1826)\n\n* webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775)\n\n* webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30661)\n\n* webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663)\n\n* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2021-30666)\n\n* webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682)\n\n* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689)\n\n* webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720)\n\n* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734)\n\n* webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744)\n\n* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749)\n\n* webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758)\n\n* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30761)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30762)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795)\n\n* webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797)\n\n* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799)\n\n* webkitgtk: limited sandbox escape via VFS syscalls (CVE-2021-42762)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30846)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30848)\n\n* webkitgtk: Multiple memory corruption issue leading to arbitrary code execution (CVE-2021-30849)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30851)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30809)\n\n* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-30818)\n\n* webkitgtk: Logic issue leading to HSTS bypass (CVE-2021-30823)\n\n* webkitgtk: Out-of-bounds read leading to memory disclosure (CVE-2021-30836)\n\n* webkitgtk: CSS compositing issue leading to revealing of the browsing history (CVE-2021-30884)\n\n* webkitgtk: Logic issue leading to Content Security Policy bypass (CVE-2021-30887)\n\n* webkitgtk: Information leak via Content Security Policy reports (CVE-2021-30888)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2021-30889)\n\n* webkitgtk: Logic issue leading to universal cross-site scripting (CVE-2021-30890)\n\n* chromium-browser: Inappropriate implementation in Navigation (CVE-2022-0108)\n\n* webkitgtk: Cross-origin data exfiltration via resource timing API (CVE-2021-30897)\n\n* webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create (CVE-2021-45481)\n\n* webkitgtk: use-after-free in WebCore::ContainerNode::firstChild (CVE-2021-45482)\n\n* webkitgtk: use-after-free in WebCore::Frame::page (CVE-2021-45483)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30934)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30936)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30951)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30952)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30953)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30954)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30984)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2022-22594)\n\n* webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript (CVE-2022-22589)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-22590)\n\n* webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2022-22592)\n\n* webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free (CVE-2022-22620)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629)\n\n* webkitgtk: logic issue was addressed with improved state management (CVE-2022-22637)\n\n* webkitgtk: heap-buffer-overflow in WebCore::TextureMapperLayer::setContentsLayer (CVE-2022-30294)\n\n* webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719)\n\n* webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662)\n\n* webkitgtk: the video in a webRTC call may be interrupted if the audio capture gets interrupted (CVE-2022-22677)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710)\n\n* webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32893)\n\n* webkitgtk: buffer overflow issue was addressed with improved memory handling (CVE-2022-32886)\n\n* webkitgtk: out-of-bounds read was addressed with improved bounds checking (CVE-2022-32912)\n\n* webkitgtk: UI spoofing while Visiting a website that frames malicious content (CVE-2022-32891)\n\n* webkitgtk: out-of-bounds write issue was addressed with improved bounds checking (CVE-2022-32888)\n\n* webkitgtk: correctness issue in the JIT was addressed with improved checks (CVE-2022-32923)\n\n* webkitgtk: issue was addressed with improved UI handling (CVE-2022-42799)\n\n* webkitgtk: sensitive information disclosure issue (CVE-2022-42824)\n\n* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2022-42823)\n\n* webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution (CVE-2022-42856)\n\n* webkitgtk: memory disclosure issue was addressed with improved memory handling (CVE-2022-42852)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-42863)\n\n* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42867)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46691)\n\n* webkitgtk: Same Origin Policy bypass issue (CVE-2022-46692)\n\n* webkitgtk: logic issue leading to user information disclosure (CVE-2022-46698)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46699)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46700)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23518)\n\n* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42826)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23517)\n\n* webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution (CVE-2023-23529)\n\n* webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild() (CVE-2023-25358)\n\n* WebKitGTK: use-after-free leads to arbitrary code execution (CVE-2023-28205)\n\n* webkitgtk: an out-of-bounds read when processing malicious content (CVE-2023-28204)\n\n* webkitgtk: a use-after-free when processing maliciously crafted web content (CVE-2023-32373)\n\n* webkitgtk: improper bounds checking leading to arbitrary code execution (CVE-2022-48503)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-32435)\n\n* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2023-32439)\n\n* webkitgtk: arbitrary code execution (CVE-2023-37450)\n\n* webkitgtk: arbitrary code execution (CVE-2023-32393)\n\n* webkitgtk: disclose sensitive information (CVE-2023-38133)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-38592)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38594)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38595)\n\n* webkitgtk: track sensitive user information (CVE-2023-38599)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38600)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38611)\n\n* webkitgtk: bypass Same Origin Policy (CVE-2023-38572)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38597)\n\n* webkitgtk: Memory corruption issue when processing web content (CVE-2022-32885)\n\n* webkitgtk: Same Origin Policy bypass via crafted web content (CVE-2023-27932)\n\n* webkitgtk: Website may be able to track sensitive user information (CVE-2023-27954)\n\n* webkitgtk: use after free vulnerability (CVE-2023-28198)\n\n* webkitgtk: content security policy blacklist failure (CVE-2023-32370)\n\n* webkitgtk: arbitrary javascript code execution (CVE-2023-40397)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32792)\n\n* webkitgtk: malicious content may lead to UI spoofing (CVE-2022-32816)\n\n* webkitgtk: processing malicious web content may lead to arbitrary code execution (CVE-2023-41993)\n\n* webkitgtk: use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports (CVE-2023-39928)\n\n* webkitgtk: processing web content may lead to arbitrary code execution (CVE-2023-35074)\n\n* webkitgtk: attacker with JavaScript execution may be able to execute arbitrary code (CVE-2023-40451)\n\n* webkitgtk: processing web content may lead to arbitrary code execution (CVE-2023-41074)\n\n* webkitgtk: Out-of-bounds read leads to sensitive data leak (CVE-2023-42916)\n\n* webkitgtk: Arbitrary Remote Code Execution (CVE-2023-42917)\n\n* webkitgtk: processing a malicious image may lead to a denial of service (CVE-2023-42883)\n\n* webkitgtk: processing malicious web content may lead to arbitrary code execution (CVE-2023-42890)\n\n* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2024-23222)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-23213)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-40414)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42833)\n\n* webkitgtk: Processing a file may lead to a denial of service or potentially disclose memory contents (CVE-2014-1745)\n\n* webkit: processing malicious web content may lead to denial-of-service (CVE-2024-23252)\n\n* webkit: malicious website may exfiltrate audio data cross-origin (CVE-2024-23254)\n\n* webkit: processing malicious web content prevents Content Security Policy from being enforced (CVE-2024-23263)\n\n* webkit: maliciously crafted webpage may be able to fingerprint the user (CVE-2024-23280)\n\n* webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced (CVE-2024-23284)\n\n* webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing. (CVE-2022-32919)\n\n* webkitgtk: A website may able to track visited websites in private browsing (CVE-2022-32933)\n\n* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2022-46705)\n\n* webkitgtk: Visiting a malicious website may lead to address bar spoofing. (CVE-2022-46725)\n\n* webkitgtk: User password may be read aloud by a text-to-speech accessibility feature (CVE-2023-32359)\n\n* webkitgtk: Processing web content may lead to a denial of service (CVE-2023-41983)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42852)\n\n* webkit: visiting a malicious website may lead to address bar spoofing (CVE-2023-42843)\n\n* webkit: heap use-after-free may lead to arbitrary code execution (CVE-2023-42950)\n\n* webkit: processing malicious web content may lead to a denial of service (CVE-2023-42956)\n\n* chromium-browser: Use after free in ANGLE (CVE-2024-4558)\n\n* webkit: pointer authentication bypass (CVE-2024-27834)\n\n* webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)\n\n* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)\n\n* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2024-40866)\n\n* webkitgtk: A malicious website may cause unexpected cross-origin behavior (CVE-2024-23271)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27808)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27833)\n\n* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2024-27838)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-44187)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44185)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44244)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2024-44296)\n\n* webkitgtk: data isolation bypass vulnerability (CVE-2024-44309)\n\n* webkitgtk: javascriptcore: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-44308)\n\n* WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54479)\n\n* webkit: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54502)\n\n* webkit: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54505)\n\n* webkit: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54508)\n\n* webkit: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54534)\n\n* webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution (CVE-2024-27856)\n\n* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54543)\n\n* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2025-24143)\n\n* webkitgtk: Copying a URL from Web Inspector may lead to command injection (CVE-2025-24150)\n\n* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2025-24158)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24162)\n\n* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54658)\n\n* webkitgtk: out-of-bounds write vulnerability (CVE-2025-24201)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44192)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-54467)\n\n* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54551)\n\n* webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack (CVE-2025-24208)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24209)\n\n* webkitgtk: A type confusion issue could lead to memory corruption (CVE-2025-24213)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24216)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24264)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-30427)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42875)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42970)\n\n* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-24223)\n\n* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-31204)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2025-31205)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-31206)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-31215)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-31257)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:10364", "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1879532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879532" }, { "category": "external", "summary": "1879535", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879535" }, { "category": "external", "summary": "1879536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879536" }, { "category": "external", "summary": "1879538", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879538" }, { "category": "external", "summary": "1879540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879540" }, { "category": "external", "summary": "1879541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879541" }, { "category": "external", "summary": "1879545", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879545" }, { "category": "external", "summary": "1879557", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879557" }, { "category": "external", "summary": "1879559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879559" }, { "category": "external", "summary": "1879563", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879563" }, { "category": "external", "summary": "1879564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879564" }, { "category": "external", "summary": "1879566", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879566" }, { "category": "external", "summary": "1879568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879568" }, { "category": "external", "summary": "1879570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879570" }, { "category": "external", "summary": "1901212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901212" }, { "category": "external", "summary": "1901214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901214" }, { "category": "external", "summary": "1901216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901216" }, { "category": "external", "summary": "1901219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901219" }, { "category": "external", "summary": "1901221", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901221" }, { "category": "external", "summary": "1903568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903568" }, { "category": "external", "summary": "1928886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928886" }, { "category": "external", "summary": "1944323", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944323" }, { "category": "external", "summary": "1944329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944329" }, { "category": "external", "summary": "1944331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944331" }, { "category": "external", "summary": "1944333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944333" }, { "category": "external", "summary": "1944337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944337" }, { "category": "external", "summary": "1944340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944340" }, { "category": "external", "summary": "1944343", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944343" }, { "category": "external", "summary": "1944350", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944350" }, { "category": "external", "summary": "1944859", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944859" }, { "category": "external", "summary": "1944862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944862" }, { "category": "external", "summary": "1944867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944867" }, { "category": "external", "summary": "1980441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980441" }, { "category": "external", "summary": "1986852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986852" }, { "category": "external", "summary": "1986856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986856" }, { "category": "external", "summary": "1986858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986858" }, { "category": "external", "summary": "1986860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986860" }, { "category": "external", "summary": "1986863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986863" }, { "category": "external", "summary": "1986866", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986866" }, { "category": "external", "summary": "1986870", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986870" }, { "category": "external", "summary": "1986872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986872" }, { "category": "external", "summary": "1986874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986874" }, { "category": "external", "summary": "1986877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986877" }, { "category": "external", "summary": "1986879", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986879" }, { "category": "external", "summary": "1986881", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986881" }, { "category": "external", "summary": "1986883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986883" }, { "category": "external", "summary": "1986886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986886" }, { "category": "external", "summary": "1986888", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986888" }, { "category": "external", "summary": "1986890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986890" }, { "category": "external", "summary": "1986892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986892" }, { "category": "external", "summary": "1986894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986894" }, { "category": "external", "summary": "1986898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986898" }, { "category": "external", "summary": "1986900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986900" }, { "category": "external", "summary": "1986902", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986902" }, { "category": "external", "summary": "1986906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986906" }, { "category": "external", "summary": "2016673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016673" }, { "category": "external", "summary": "2017898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017898" }, { "category": "external", "summary": "2017901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017901" }, { "category": "external", "summary": "2017904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017904" }, { "category": "external", "summary": "2018573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018573" }, { "category": "external", "summary": "2034347", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034347" }, { "category": "external", "summary": "2034368", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034368" }, { "category": "external", "summary": "2034373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034373" }, { "category": "external", "summary": "2034376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034376" }, { "category": "external", "summary": "2034378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034378" }, { "category": "external", "summary": "2034381", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034381" }, { "category": "external", "summary": "2034383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034383" }, { "category": "external", "summary": "2034386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034386" }, { "category": "external", "summary": "2034389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034389" }, { "category": "external", "summary": "2037469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037469" }, { "category": "external", "summary": "2038907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038907" }, { "category": "external", "summary": "2040327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040327" }, { "category": "external", "summary": "2040329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040329" }, { "category": "external", "summary": "2040331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040331" }, { "category": "external", "summary": "2044521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044521" }, { "category": "external", "summary": "2044528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044528" }, { "category": "external", "summary": "2044534", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044534" }, { "category": "external", "summary": "2044538", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044538" }, { "category": "external", "summary": "2044542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044542" }, { "category": "external", "summary": "2044551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044551" }, { "category": "external", "summary": "2044553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044553" }, { "category": "external", "summary": "2045291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045291" }, { "category": "external", "summary": "2053179", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053179" }, { "category": "external", "summary": "2053181", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053181" }, { "category": "external", "summary": "2053185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053185" }, { "category": "external", "summary": "2056474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056474" }, { "category": "external", "summary": "2073893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073893" }, { "category": "external", "summary": "2073896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073896" }, { "category": "external", "summary": "2073899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073899" }, { "category": "external", "summary": "2073903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073903" }, { "category": "external", "summary": "2082544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082544" }, { "category": "external", "summary": "2082548", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082548" }, { "category": "external", "summary": "2092732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092732" }, { "category": "external", "summary": "2092733", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092733" }, { "category": "external", "summary": "2092734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092734" }, { "category": "external", "summary": "2092735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092735" }, { "category": "external", "summary": "2092736", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092736" }, { "category": "external", "summary": "2104787", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104787" }, { "category": "external", "summary": "2104788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104788" }, { "category": "external", "summary": "2104789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104789" }, { "category": "external", "summary": "2121645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121645" }, { "category": "external", "summary": "2128643", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128643" }, { "category": "external", "summary": "2128645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128645" }, { "category": "external", "summary": "2128647", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128647" }, { "category": "external", "summary": "2140501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140501" }, { "category": "external", "summary": "2140502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140502" }, { "category": "external", "summary": "2140503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140503" }, { "category": "external", "summary": "2140504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140504" }, { "category": "external", "summary": "2140505", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140505" }, { "category": "external", "summary": "2153683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153683" }, { "category": "external", "summary": "2156986", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156986" }, { "category": "external", "summary": "2156987", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156987" }, { "category": "external", "summary": "2156989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156989" }, { "category": "external", "summary": "2156990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156990" }, { "category": "external", "summary": "2156991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156991" }, { "category": "external", "summary": "2156992", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156992" }, { "category": "external", "summary": "2156993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156993" }, { "category": "external", "summary": "2156994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156994" }, { "category": "external", "summary": "2167715", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167715" }, { "category": "external", "summary": "2167716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167716" }, { "category": "external", "summary": "2167717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167717" }, { "category": "external", "summary": "2169934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2169934" }, { "category": "external", "summary": "2175099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175099" }, { "category": "external", "summary": "2185724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185724" }, { "category": "external", "summary": "2209208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209208" }, { "category": "external", "summary": "2209214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209214" }, { "category": "external", "summary": "2218623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218623" }, { "category": "external", "summary": "2218626", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218626" }, { "category": "external", "summary": "2218640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218640" }, { "category": "external", "summary": "2223000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223000" }, { "category": "external", "summary": "2224608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2224608" }, { "category": "external", "summary": "2231015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231015" }, { "category": "external", "summary": "2231017", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231017" }, { "category": "external", "summary": "2231018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231018" }, { "category": "external", "summary": "2231019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231019" }, { "category": "external", "summary": "2231020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231020" }, { "category": "external", "summary": "2231021", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231021" }, { "category": "external", "summary": "2231022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231022" }, { "category": "external", "summary": "2231028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231028" }, { "category": "external", "summary": "2231043", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231043" }, { "category": "external", "summary": "2236842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842" }, { "category": "external", "summary": "2236843", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236843" }, { "category": "external", "summary": "2236844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236844" }, { "category": "external", "summary": "2238943", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238943" }, { "category": "external", "summary": "2238944", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238944" }, { "category": "external", "summary": "2238945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945" }, { "category": "external", "summary": "2238973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238973" }, { "category": "external", "summary": "2238975", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238975" }, { "category": "external", "summary": "2240522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240522" }, { "category": "external", "summary": "2241400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241400" }, { "category": "external", "summary": "2241403", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241403" }, { "category": "external", "summary": "2241409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241409" }, { "category": "external", "summary": "2241412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241412" }, { "category": "external", "summary": "2253054", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253054" }, { "category": "external", "summary": "2253058", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058" }, { "category": "external", "summary": "2254326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254326" }, { "category": "external", "summary": "2254327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254327" }, { "category": "external", "summary": "2259893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893" }, { "category": "external", "summary": "2270141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270141" }, { "category": "external", "summary": "2270143", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270143" }, { "category": "external", "summary": "2270146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270146" }, { "category": "external", "summary": "2270151", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270151" }, { "category": "external", "summary": "2270288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270288" }, { "category": "external", "summary": "2270289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270289" }, { "category": "external", "summary": "2270290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270290" }, { "category": "external", "summary": "2270291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270291" }, { "category": "external", "summary": "2270292", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270292" }, { "category": "external", "summary": "2271437", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271437" }, { "category": "external", "summary": "2271441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271441" }, { "category": "external", "summary": "2271444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271444" }, { "category": "external", "summary": "2271446", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271446" }, { "category": "external", "summary": "2271449", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271449" }, { "category": "external", "summary": "2271453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271453" }, { "category": "external", "summary": "2271456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456" }, { "category": "external", "summary": "2271717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271717" }, { "category": "external", "summary": "2271718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271718" }, { "category": "external", "summary": "2271719", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271719" }, { "category": "external", "summary": "2279689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689" }, { "category": "external", "summary": "2282412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282412" }, { "category": "external", "summary": "2301841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841" }, { "category": "external", "summary": "2302067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067" }, { "category": "external", "summary": "2302069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069" }, { "category": "external", "summary": "2302070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070" }, { "category": "external", "summary": "2302071", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071" }, { "category": "external", "summary": "2312724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312724" }, { "category": "external", "summary": "2314696", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314696" }, { "category": "external", "summary": "2314697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697" }, { "category": "external", "summary": "2314698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698" }, { "category": "external", "summary": "2314700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700" }, { "category": "external", "summary": "2314702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314702" }, { "category": "external", "summary": "2314704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704" }, { "category": "external", "summary": "2314706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314706" }, { "category": "external", "summary": "2323263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263" }, { "category": "external", "summary": "2323278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278" }, { "category": "external", "summary": "2323289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323289" }, { "category": "external", "summary": "2327927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327927" }, { "category": "external", "summary": "2327931", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327931" }, { "category": "external", "summary": "2333841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333841" }, { "category": "external", "summary": "2333843", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333843" }, { "category": "external", "summary": "2333844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333844" }, { "category": "external", "summary": "2333845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333845" }, { "category": "external", "summary": "2333846", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333846" }, { "category": "external", "summary": "2344618", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344618" }, { "category": "external", "summary": "2344619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344619" }, { "category": "external", "summary": "2344621", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344621" }, { "category": "external", "summary": "2344622", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344622" }, { "category": "external", "summary": "2344623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344623" }, { "category": "external", "summary": "2344624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344624" }, { "category": "external", "summary": "2344946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344946" }, { "category": "external", "summary": "2351802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351802" }, { "category": "external", "summary": "2353871", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353871" }, { "category": "external", "summary": "2353872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353872" }, { "category": "external", "summary": "2357909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357909" }, { "category": "external", "summary": "2357910", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357910" }, { "category": "external", "summary": "2357911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357911" }, { "category": "external", "summary": "2357913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357913" }, { "category": "external", "summary": "2357917", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357917" }, { "category": "external", "summary": "2357918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357918" }, { "category": "external", "summary": "2357919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357919" }, { "category": "external", "summary": "2366497", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366497" }, { "category": "external", "summary": "2366498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366498" }, { "category": "external", "summary": "2366499", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366499" }, { "category": "external", "summary": "2366500", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366500" }, { "category": "external", "summary": "2366501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366501" }, { "category": "external", "summary": "2366502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366502" }, { "category": "external", "summary": "2366503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366503" }, { "category": "external", "summary": "2366504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366504" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10364.json" } ], "title": "Red Hat Security Advisory: webkitgtk4 security update", "tracking": { "current_release_date": "2025-07-16T14:44:43+00:00", "generator": { "date": "2025-07-16T14:44:43+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.3" } }, "id": "RHSA-2025:10364", "initial_release_date": "2025-07-07T02:28:52+00:00", "revision_history": [ { "date": "2025-07-07T02:28:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-07-07T02:28:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-07-16T14:44:43+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7 ELS)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "webkitgtk4-0:2.48.3-2.el7_9.src", "product": { "name": "webkitgtk4-0:2.48.3-2.el7_9.src", "product_id": "webkitgtk4-0:2.48.3-2.el7_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4@2.48.3-2.el7_9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "webkitgtk4-0:2.48.3-2.el7_9.x86_64", "product": { "name": "webkitgtk4-0:2.48.3-2.el7_9.x86_64", "product_id": "webkitgtk4-0:2.48.3-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4@2.48.3-2.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "product": { "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "product_id": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-devel@2.48.3-2.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "product": { "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "product_id": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-jsc@2.48.3-2.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "product": { "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "product_id": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-jsc-devel@2.48.3-2.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "product": { "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "product_id": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-debuginfo@2.48.3-2.el7_9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "webkitgtk4-0:2.48.3-2.el7_9.s390x", "product": { "name": "webkitgtk4-0:2.48.3-2.el7_9.s390x", "product_id": "webkitgtk4-0:2.48.3-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4@2.48.3-2.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "product": { "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "product_id": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-jsc@2.48.3-2.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "product": { "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "product_id": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-debuginfo@2.48.3-2.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "product": { "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "product_id": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-devel@2.48.3-2.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "product": { "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "product_id": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-jsc-devel@2.48.3-2.el7_9?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "product": { "name": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "product_id": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-doc@2.48.3-2.el7_9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.48.3-2.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src" }, "product_reference": "webkitgtk4-0:2.48.3-2.el7_9.src", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch" }, "product_reference": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.48.3-2.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src" }, "product_reference": "webkitgtk4-0:2.48.3-2.el7_9.src", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch" }, "product_reference": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-ELS" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-1745", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270151" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in the SVG implementation within WebKitGTK. This flaw allows remote attackers to exploit the removal of an SVGFontFaceElement object, which occurs through specific vectors that trigger the deletion of the object during rendering.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing a file may lead to a denial of service or potentially disclose memory contents", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-1745" }, { "category": "external", "summary": "RHBZ#2270151", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270151" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-1745", "url": "https://www.cve.org/CVERecord?id=CVE-2014-1745" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-1745", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1745" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0001.html", "url": "https://webkitgtk.org/security/WSA-2024-0001.html" } ], "release_date": "2024-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing a file may lead to a denial of service or potentially disclose memory contents" }, { "cve": "CVE-2020-9802", "cwe": { "id": "CWE-841", "name": "Improper Enforcement of Behavioral Workflow" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879545" } ], "notes": [ { "category": "description", "text": "A logic issue was found in webkitgtk that affected WebKitGTK versions before 2.28.3 and WPE WebKit versions before 2.28.3. This flaw allows an attacker to process maliciously crafted web content that may lead to arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9802" }, { "category": "external", "summary": "RHBZ#1879545", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879545" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9802", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9802" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9802", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9802" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue may lead to arbitrary code execution" }, { "cve": "CVE-2020-9803", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879557" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk in versions prior to 2.28.3 and in WPE WebKit in versions prior to 2.28.3. A memory corruption issue could allow processing maliciously crafted web content leading to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9803" }, { "category": "external", "summary": "RHBZ#1879557", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879557" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9803", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9803" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption may lead to arbitrary code execution" }, { "cve": "CVE-2020-9805", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879559" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue may lead to cross site scripting", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9805" }, { "category": "external", "summary": "RHBZ#1879559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879559" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9805", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9805" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue may lead to cross site scripting" }, { "cve": "CVE-2020-9806", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879563" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkit gtk in versions prior to 2.28.3 and in WPE WebKit in versions prior to 2.28.3. A memory corruption issue could allow processing of maliciously crafted web content that could lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9806" }, { "category": "external", "summary": "RHBZ#1879563", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879563" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9806", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9806" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption may lead to arbitrary code execution" }, { "cve": "CVE-2020-9807", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879564" } ], "notes": [ { "category": "description", "text": "A memory corruption issue was found in webkitgtk that affected WebKitGTK versions before 2.28.3 and WPE WebKit versions before 2.28.3. This flaw allows an attacker to process maliciously crafted web content that may lead to arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9807" }, { "category": "external", "summary": "RHBZ#1879564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9807", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9807" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9807", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9807" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption may lead to arbitrary code execution" }, { "cve": "CVE-2020-9843", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879566" } ], "notes": [ { "category": "description", "text": "An input validation issue was addressed with improved input validation. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to a cross site scripting attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Input validation issue may lead to cross site scripting", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9843" }, { "category": "external", "summary": "RHBZ#1879566", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879566" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9843", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9843" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Input validation issue may lead to cross site scripting" }, { "cve": "CVE-2020-9850", "cwe": { "id": "CWE-841", "name": "Improper Enforcement of Behavioral Workflow" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879568" } ], "notes": [ { "category": "description", "text": "A logic issue was found in webkitgtk that affected WebKitGTK versions before 2.28.3 and WPE WebKit versions before 2.28.3. This flaw allows a remote attacker to cause arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t shipped any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9850" }, { "category": "external", "summary": "RHBZ#1879568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879568" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9850", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9850" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9850", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9850" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue may lead to arbitrary code execution" }, { "cve": "CVE-2020-9862", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879532" } ], "notes": [ { "category": "description", "text": "A command injection issue existed in Web Inspector. This issue was addressed with improved escaping. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Copying a URL from Web Inspector may lead to command injection.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Command injection in web inspector", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9862" }, { "category": "external", "summary": "RHBZ#1879532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879532" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9862", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9862" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9862", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9862" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0007.html", "url": "https://webkitgtk.org/security/WSA-2020-0007.html" } ], "release_date": "2020-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Command injection in web inspector" }, { "cve": "CVE-2020-9893", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879535" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in webkitgtk that affected WebKitGTK versions before 2.28.4 and WPE WebKit versions before 2.28.4. This flaw allows a remote attacker to cause unexpected application termination or arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free may lead to application termination or arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9893" }, { "category": "external", "summary": "RHBZ#1879535", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879535" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9893", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9893" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9893", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9893" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0007.html", "url": "https://webkitgtk.org/security/WSA-2020-0007.html" } ], "release_date": "2020-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free may lead to application termination or arbitrary code execution" }, { "cve": "CVE-2020-9894", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879536" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in webkitgtk that affected WebKitGTK versions before 2.28.4 and WPE WebKit versions before 2.28.4. This flaw allows a remote attacker to cause unexpected application termination or arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Out-of-bounds read may lead to unexpected application termination or arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9894" }, { "category": "external", "summary": "RHBZ#1879536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879536" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9894", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9894" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9894", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9894" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0007.html", "url": "https://webkitgtk.org/security/WSA-2020-0007.html" } ], "release_date": "2020-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Out-of-bounds read may lead to unexpected application termination or arbitrary code execution" }, { "cve": "CVE-2020-9895", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879538" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk in versions prior to 2.28.4 and in WPE WebKit in versions prior to 2.28.4. A use-after-free issue was found allowing a remote attacker to cause unexpected application termination or arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free may lead to application termination or arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9895" }, { "category": "external", "summary": "RHBZ#1879538", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879538" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9895", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9895" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9895", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9895" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0007.html", "url": "https://webkitgtk.org/security/WSA-2020-0007.html" } ], "release_date": "2020-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free may lead to application termination or arbitrary code execution" }, { "cve": "CVE-2020-9915", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879540" } ], "notes": [ { "category": "description", "text": "An access issue existed in Content Security Policy. This issue was addressed with improved access restrictions. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing maliciously crafted web content may prevent Content Security Policy from being enforced.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Access issue in content security policy", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9915" }, { "category": "external", "summary": "RHBZ#1879540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9915", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9915" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9915", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9915" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0007.html", "url": "https://webkitgtk.org/security/WSA-2020-0007.html" } ], "release_date": "2020-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Access issue in content security policy" }, { "cve": "CVE-2020-9925", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879541" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved state management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A logic issue may lead to cross site scripting", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9925" }, { "category": "external", "summary": "RHBZ#1879541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879541" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9925", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9925" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9925", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9925" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0007.html", "url": "https://webkitgtk.org/security/WSA-2020-0007.html" } ], "release_date": "2020-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A logic issue may lead to cross site scripting" }, { "cve": "CVE-2020-9947", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944331" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.0. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use after free issue may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9947" }, { "category": "external", "summary": "RHBZ#1944331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944331" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9947", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9947" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9947", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9947" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use after free issue may lead to arbitrary code execution" }, { "cve": "CVE-2020-9948", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2020-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901214" } ], "notes": [ { "category": "description", "text": "A type confusion issue was addressed with improved memory handling. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: type confusion may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9948" }, { "category": "external", "summary": "RHBZ#1901214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901214" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9948", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9948" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9948", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9948" } ], "release_date": "2020-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: type confusion may lead to arbitrary code execution" }, { "cve": "CVE-2020-9951", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901216" } ], "notes": [ { "category": "description", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9951" }, { "category": "external", "summary": "RHBZ#1901216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901216" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9951", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9951" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9951", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9951" } ], "release_date": "2020-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free may lead to arbitrary code execution" }, { "cve": "CVE-2020-9952", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901219" } ], "notes": [ { "category": "description", "text": "An input validation issue was addressed with improved input validation. This issue is fixed in iOS 14.0 and iPadOS 14.0, tvOS 14.0, watchOS 7.0, Safari 14.0, iCloud for Windows 11.4, iCloud for Windows 7.21. Processing maliciously crafted web content may lead to a cross site scripting attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: input validation issue may lead to a cross site scripting", "title": "Vulnerability summary" }, { "category": "other", "text": "webkit2gtk3 as shipped with Red Hat Enterprise Linux 8 is not affected by this flaw, as the version shipped is newer than the affected version range.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9952" }, { "category": "external", "summary": "RHBZ#1901219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901219" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9952", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9952" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9952", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9952" } ], "release_date": "2020-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: input validation issue may lead to a cross site scripting" }, { "cve": "CVE-2020-9983", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2020-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901221" } ], "notes": [ { "category": "description", "text": "An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: out-of-bounds write may lead to code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9983" }, { "category": "external", "summary": "RHBZ#1901221", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901221" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9983", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9983" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9983", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9983" } ], "release_date": "2020-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: out-of-bounds write may lead to code execution" }, { "cve": "CVE-2020-13543", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-12-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1903568" } ], "notes": [ { "category": "description", "text": "A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-13543" }, { "category": "external", "summary": "RHBZ#1903568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903568" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-13543", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13543" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0009.html", "url": "https://webkitgtk.org/security/WSA-2020-0009.html" } ], "release_date": "2020-11-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free may lead to arbitrary code execution" }, { "cve": "CVE-2020-13558", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1928886" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in the AudioSourceProviderGStreamer class of WebKitGTK and WPE WebKit in versions prior to 2.30.5. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-13558" }, { "category": "external", "summary": "RHBZ#1928886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928886" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-13558", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13558" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0001.html", "url": "https://webkitgtk.org/security/WSA-2021-0001.html" } ], "release_date": "2021-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution" }, { "cve": "CVE-2020-13584", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901212" } ], "notes": [ { "category": "description", "text": "An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.1 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in a remote code execution. The victim needs to visit a malicious web site to trigger this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-13584" }, { "category": "external", "summary": "RHBZ#1901212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-13584", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13584" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13584", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13584" } ], "release_date": "2020-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free may lead to arbitrary code execution" }, { "cve": "CVE-2020-13753", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879570" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk in versions prior to 2.28.3 and in WPE WebKit in versions prior to 2.28.3. The bubblewrap sandbox failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg- desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal\u2019s input buffer, similar to CVE-2017-5226. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Improper access management to CLONE_NEWUSER and the TIOCSTI ioctl", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-13753" }, { "category": "external", "summary": "RHBZ#1879570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-13753", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13753" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13753", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13753" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Improper access management to CLONE_NEWUSER and the TIOCSTI ioctl" }, { "cve": "CVE-2020-27918", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944323" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-27918" }, { "category": "external", "summary": "RHBZ#1944323", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944323" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27918", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27918" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27918", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27918" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2020-29623", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944329" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. A user may be unable to fully delete the browsing history under some circumstances. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: User may be unable to fully delete browsing history", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-29623" }, { "category": "external", "summary": "RHBZ#1944329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944329" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-29623", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29623" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29623", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29623" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "webkitgtk: User may be unable to fully delete browsing history" }, { "cve": "CVE-2021-1765", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944333" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Maliciously crafted web content may violate the iframe sandboxing policy. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: IFrame sandboxing policy violation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1765" }, { "category": "external", "summary": "RHBZ#1944333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944333" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1765", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1765" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1765", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1765" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: IFrame sandboxing policy violation" }, { "cve": "CVE-2021-1788", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944859" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in WebKitGTK and WPE WebKit in versions prior to 2.32.0. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1788" }, { "category": "external", "summary": "RHBZ#1944859", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944859" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1788", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1788" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0003.html", "url": "https://webkitgtk.org/security/WSA-2021-0003.html" } ], "release_date": "2021-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2021-1789", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944337" } ], "notes": [ { "category": "description", "text": "A type confusion vulnerability was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Type confusion issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1789" }, { "category": "external", "summary": "RHBZ#1944337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944337" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1789", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1789" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1789", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1789" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-05-04T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Type confusion issue leading to arbitrary code execution" }, { "cve": "CVE-2021-1799", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944340" } ], "notes": [ { "category": "description", "text": "A port redirection issue was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. A malicious website may be able to access restricted ports on arbitrary servers. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Access to restricted ports on arbitrary servers via port redirection", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1799" }, { "category": "external", "summary": "RHBZ#1944340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944340" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1799", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1799" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1799", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1799" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Access to restricted ports on arbitrary servers via port redirection" }, { "cve": "CVE-2021-1801", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944343" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Maliciously crafted web content may violate the iframe sandboxing policy. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: IFrame sandboxing policy violation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1801" }, { "category": "external", "summary": "RHBZ#1944343", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944343" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1801", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1801" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1801", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1801" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: IFrame sandboxing policy violation" }, { "cve": "CVE-2021-1817", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986852" } ], "notes": [ { "category": "description", "text": "A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1817" }, { "category": "external", "summary": "RHBZ#1986852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986852" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1817", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1817" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1817", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1817" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption leading to arbitrary code execution" }, { "cve": "CVE-2021-1820", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986856" } ], "notes": [ { "category": "description", "text": "A memory initialization issue was addressed with improved memory handling. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may result in the disclosure of process memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory initialization issue possibly leading to memory disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1820" }, { "category": "external", "summary": "RHBZ#1986856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986856" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1820", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1820" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1820", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1820" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory initialization issue possibly leading to memory disclosure" }, { "cve": "CVE-2021-1825", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986858" } ], "notes": [ { "category": "description", "text": "An input validation issue was addressed with improved input validation. This issue is fixed in iTunes 12.11.3 for Windows, iCloud for Windows 12.3, macOS Big Sur 11.3, Safari 14.1, watchOS 7.4, tvOS 14.5, iOS 14.5 and iPadOS 14.5. Processing maliciously crafted web content may lead to a cross site scripting attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Input validation issue leading to cross site scripting attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1825" }, { "category": "external", "summary": "RHBZ#1986858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986858" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1825", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1825" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1825", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1825" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Input validation issue leading to cross site scripting attack" }, { "cve": "CVE-2021-1826", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986860" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to universal cross site scripting attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1826" }, { "category": "external", "summary": "RHBZ#1986860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1826", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1826" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1826", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1826" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to universal cross site scripting attack" }, { "cve": "CVE-2021-1844", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2021-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944862" } ], "notes": [ { "category": "description", "text": "A memory corruption issue was found in WebKitGTK and WPE WebKit in versions prior to 2.32.0. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1844" }, { "category": "external", "summary": "RHBZ#1944862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944862" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1844", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1844" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1844", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1844" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0003.html", "url": "https://webkitgtk.org/security/WSA-2021-0003.html" } ], "release_date": "2021-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2021-1870", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944350" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. A remote attacker may be able to cause arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1870" }, { "category": "external", "summary": "RHBZ#1944350", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944350" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1870", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1870" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1870", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1870" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to arbitrary code execution" }, { "cve": "CVE-2021-1871", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944867" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK and WPE WebKit in versions prior to 2.32.0. A remote attacker may be able to cause arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1871" }, { "category": "external", "summary": "RHBZ#1944867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944867" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1871", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1871" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1871", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1871" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0003.html", "url": "https://webkitgtk.org/security/WSA-2021-0003.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to arbitrary code execution" }, { "cve": "CVE-2021-21775", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986863" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability exists in the way certain events are processed for ImageLoader objects of Webkit WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. In order to trigger the vulnerability, a victim must be tricked into visiting a malicious webpage.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21775" }, { "category": "external", "summary": "RHBZ#1986863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986863" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21775", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21775" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21775", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21775" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution" }, { "cve": "CVE-2021-21779", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986866" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability exists in the way Webkit\u2019s GraphicsContext handles certain events in WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21779" }, { "category": "external", "summary": "RHBZ#1986866", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986866" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21779", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21779" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21779", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21779" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution" }, { "cve": "CVE-2021-21806", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-07-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1980441" } ], "notes": [ { "category": "description", "text": "An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.3 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in remote code execution. The victim needs to visit a malicious web site to trigger the vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21806" }, { "category": "external", "summary": "RHBZ#1980441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980441" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21806", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21806" }, { "category": "external", "summary": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1214", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1214" } ], "release_date": "2021-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution" }, { "cve": "CVE-2021-30661", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986870" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by a use-after-free in the WebKit component. An attacker can execute arbitrary code on the system by persuading a victim to visit a specially crafted Web site.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30661" }, { "category": "external", "summary": "RHBZ#1986870", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986870" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30661", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30661" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30661", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30661" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2021-30663", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986872" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by an integer overflow in the WebKit component. An attacker can execute arbitrary code on the system by persuading a victim to visit a specially crafted Web site.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Integer overflow leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30663" }, { "category": "external", "summary": "RHBZ#1986872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986872" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30663", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30663" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30663", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30663" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Integer overflow leading to arbitrary code execution" }, { "cve": "CVE-2021-30665", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986874" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by a memory corruption issue in the WebKit component. An attacker can execute arbitrary code on the system by persuading a victim to visit a specially crafted Web site.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30665" }, { "category": "external", "summary": "RHBZ#1986874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986874" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30665", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30665" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30665", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30665" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption leading to arbitrary code execution" }, { "cve": "CVE-2021-30666", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986877" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. Affected versions of this package are vulnerable to a buffer overflow caused by improper bounds checking by the WebKit component. By persuading a victim to visit a specially crafted Web site, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Buffer overflow leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30666" }, { "category": "external", "summary": "RHBZ#1986877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986877" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30666", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30666" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30666", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30666" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Buffer overflow leading to arbitrary code execution" }, { "cve": "CVE-2021-30682", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986879" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious application may be able to leak sensitive user information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to leak of sensitive user information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30682" }, { "category": "external", "summary": "RHBZ#1986879", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986879" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30682", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30682" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30682", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30682" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to leak of sensitive user information" }, { "cve": "CVE-2021-30689", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986881" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved state management. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to universal cross site scripting attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30689" }, { "category": "external", "summary": "RHBZ#1986881", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986881" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30689", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30689" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30689", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30689" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to universal cross site scripting attack" }, { "cve": "CVE-2021-30720", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986883" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious website may be able to access restricted ports on arbitrary servers.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30720" }, { "category": "external", "summary": "RHBZ#1986883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986883" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30720", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30720" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers" }, { "cve": "CVE-2021-30734", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986886" } ], "notes": [ { "category": "description", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruptions leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30734" }, { "category": "external", "summary": "RHBZ#1986886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986886" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30734", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30734" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30734", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30734" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruptions leading to arbitrary code execution" }, { "cve": "CVE-2021-30744", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986888" } ], "notes": [ { "category": "description", "text": "Description: A cross-origin issue with iframe elements was addressed with improved tracking of security origins. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30744" }, { "category": "external", "summary": "RHBZ#1986888", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986888" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30744", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30744" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30744", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30744" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack" }, { "cve": "CVE-2021-30749", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986890" } ], "notes": [ { "category": "description", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruptions leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30749" }, { "category": "external", "summary": "RHBZ#1986890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30749", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30749" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30749", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30749" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruptions leading to arbitrary code execution" }, { "cve": "CVE-2021-30758", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986892" } ], "notes": [ { "category": "description", "text": "A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Type confusion leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30758" }, { "category": "external", "summary": "RHBZ#1986892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986892" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30758", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30758" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30758", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30758" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Type confusion leading to arbitrary code execution" }, { "cve": "CVE-2021-30761", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986894" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by memory corruption in the WebKit component. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to execute arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30761" }, { "category": "external", "summary": "RHBZ#1986894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986894" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30761", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30761" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30761", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30761" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption leading to arbitrary code execution" }, { "cve": "CVE-2021-30762", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986898" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by a use-after-free in the WebKit component. By persuading a victim to visit a specially crafted Web site, an attacker can execute arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30762" }, { "category": "external", "summary": "RHBZ#1986898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986898" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30762", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30762" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30762", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30762" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2021-30795", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986900" } ], "notes": [ { "category": "description", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30795" }, { "category": "external", "summary": "RHBZ#1986900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986900" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30795", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30795" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30795", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30795" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2021-30797", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986902" } ], "notes": [ { "category": "description", "text": "This issue was addressed with improved checks. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Insufficient checks leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30797" }, { "category": "external", "summary": "RHBZ#1986902", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986902" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30797", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30797" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30797", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30797" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Insufficient checks leading to arbitrary code execution" }, { "cve": "CVE-2021-30799", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986906" } ], "notes": [ { "category": "description", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruptions leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30799" }, { "category": "external", "summary": "RHBZ#1986906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986906" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30799", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30799" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30799", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30799" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruptions leading to arbitrary code execution" }, { "cve": "CVE-2021-30809", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034347" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30809" }, { "category": "external", "summary": "RHBZ#2034347", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034347" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30809", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30809" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30809", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30809" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2021-30818", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034368" } ], "notes": [ { "category": "description", "text": "A confusion type flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Type confusion issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30818" }, { "category": "external", "summary": "RHBZ#2034368", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034368" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30818", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30818" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30818", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30818" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Type confusion issue leading to arbitrary code execution" }, { "cve": "CVE-2021-30823", "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034373" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK. An attacker in a privileged network position could use this flaw to bypass HSTS.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to HSTS bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30823" }, { "category": "external", "summary": "RHBZ#2034373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034373" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30823", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30823" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30823", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30823" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to HSTS bypass" }, { "cve": "CVE-2021-30836", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034376" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in WebKitGTK. A specially crafted audio file could use this flaw to trigger a disclosure of memory when processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Out-of-bounds read leading to memory disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30836" }, { "category": "external", "summary": "RHBZ#2034376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034376" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30836", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30836" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30836", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30836" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "webkitgtk: Out-of-bounds read leading to memory disclosure" }, { "cve": "CVE-2021-30846", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2017898" } ], "notes": [ { "category": "description", "text": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, watchOS 8. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30846" }, { "category": "external", "summary": "RHBZ#2017898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017898" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30846", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30846" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30846", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30846" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0006.html", "url": "https://webkitgtk.org/security/WSA-2021-0006.html" } ], "release_date": "2021-10-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2021-30848", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2017901" } ], "notes": [ { "category": "description", "text": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30848" }, { "category": "external", "summary": "RHBZ#2017901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017901" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30848", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30848" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30848", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30848" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0006.html", "url": "https://webkitgtk.org/security/WSA-2021-0006.html" } ], "release_date": "2021-10-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2021-30849", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2017904" } ], "notes": [ { "category": "description", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, watchOS 8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, iTunes 12.12 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Multiple memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30849" }, { "category": "external", "summary": "RHBZ#2017904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30849", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30849" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30849", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30849" } ], "release_date": "2021-10-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Multiple memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2021-30851", "discovery_date": "2021-10-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2018573" } ], "notes": [ { "category": "description", "text": "A memory corruption vulnerability was addressed with improved locking. This issue is fixed in Safari 15, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30851" }, { "category": "external", "summary": "RHBZ#2018573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018573" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30851", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30851" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30851", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30851" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0006.html", "url": "https://webkitgtk.org/security/WSA-2021-0006.html" } ], "release_date": "2021-10-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2021-30884", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034378" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way WebKitGTK performed CSS compositing. A malicious web site could possibly use this flaw to reveal user\u0027s browsing history.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: CSS compositing issue leading to revealing of the browsing history", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30884" }, { "category": "external", "summary": "RHBZ#2034378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034378" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30884", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30884" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30884", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30884" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "webkitgtk: CSS compositing issue leading to revealing of the browsing history" }, { "cve": "CVE-2021-30887", "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034381" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK. A specially crafted web content could use this flaw to bypass Content Security Policy bypass when processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to Content Security Policy bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30887" }, { "category": "external", "summary": "RHBZ#2034381", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034381" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30887", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30887" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30887", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30887" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to Content Security Policy bypass" }, { "cve": "CVE-2021-30888", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034383" } ], "notes": [ { "category": "description", "text": "An information leak flaw was found in WebKitGTK. A malicious web site using Content Security Policy reports could use this flaw to leak information via redirects.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Information leak via Content Security Policy reports", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30888" }, { "category": "external", "summary": "RHBZ#2034383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034383" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30888", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30888" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Information leak via Content Security Policy reports" }, { "cve": "CVE-2021-30889", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034386" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Buffer overflow leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30889" }, { "category": "external", "summary": "RHBZ#2034386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034386" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30889", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30889" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30889", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30889" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Buffer overflow leading to arbitrary code execution" }, { "cve": "CVE-2021-30890", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034389" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK. Specially crafted web content could use this flaw to trigger a universal cross-site scripting when processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to universal cross-site scripting", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30890" }, { "category": "external", "summary": "RHBZ#2034389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034389" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30890", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30890" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30890", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30890" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to universal cross-site scripting" }, { "cve": "CVE-2021-30897", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2038907" } ], "notes": [ { "category": "description", "text": "A flaw was found in the resource timing API specification and its implementation in WebKitGTK. A malicious web site could use this flaw to trigger a cross-domain data exfiltration.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Cross-origin data exfiltration via resource timing API", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30897" }, { "category": "external", "summary": "RHBZ#2038907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038907" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30897", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30897" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30897", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30897" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Cross-origin data exfiltration via resource timing API" }, { "cve": "CVE-2021-30934", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044521" } ], "notes": [ { "category": "description", "text": "A buffer overflow vulnerability was found in webkitgtk. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash or lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30934" }, { "category": "external", "summary": "RHBZ#2044521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044521" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30934", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30934" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30934", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30934" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-30936", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044528" } ], "notes": [ { "category": "description", "text": "A use after free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30936" }, { "category": "external", "summary": "RHBZ#2044528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044528" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30936", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30936" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30936", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30936" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-30951", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044534" } ], "notes": [ { "category": "description", "text": "A use after free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30951" }, { "category": "external", "summary": "RHBZ#2044534", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044534" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30951", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30951" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30951", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30951" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-30952", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044538" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, which can lead to an integer overflow. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30952" }, { "category": "external", "summary": "RHBZ#2044538", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044538" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30952", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30952" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30952", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30952" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-30953", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044542" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper bounds checking, which can lead to an out-of-bounds read vulnerability. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30953" }, { "category": "external", "summary": "RHBZ#2044542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30953", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30953" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30953", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30953" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-30954", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044551" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper memory handling, which can lead to a type confusion issue. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30954" }, { "category": "external", "summary": "RHBZ#2044551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044551" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30954", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30954" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30954", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30954" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-30984", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044553" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper state handling, which can lead to a race condition. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30984" }, { "category": "external", "summary": "RHBZ#2044553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044553" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30984", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30984" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30984", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30984" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-42762", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-10-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2016673" } ], "notes": [ { "category": "description", "text": "BubblewrapLauncher.cpp in WebKitGTK and WPE WebKit before 2.34.1 allows a limited sandbox bypass that allows a sandboxed process to trick host processes into thinking the sandboxed process is not confined by the sandbox, by abusing VFS syscalls that manipulate its filesystem namespace. The impact is limited to host services that create UNIX sockets that WebKit mounts inside its sandbox, and the sandboxed process remains otherwise confined. NOTE: this is similar to CVE-2021-41133.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: limited sandbox escape via VFS syscalls", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-42762" }, { "category": "external", "summary": "RHBZ#2016673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016673" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-42762", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42762" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-42762", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42762" } ], "release_date": "2021-10-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: limited sandbox escape via VFS syscalls" }, { "cve": "CVE-2021-45481", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2021-12-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2040327" } ], "notes": [ { "category": "description", "text": "A segmentation violation vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-45481" }, { "category": "external", "summary": "RHBZ#2040327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040327" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-45481", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45481" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45481", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45481" } ], "release_date": "2021-12-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create" }, { "cve": "CVE-2021-45482", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-12-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2040329" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free in WebCore::ContainerNode::firstChild", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-45482" }, { "category": "external", "summary": "RHBZ#2040329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040329" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-45482", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45482" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45482", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45482" } ], "release_date": "2021-12-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free in WebCore::ContainerNode::firstChild" }, { "cve": "CVE-2021-45483", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-12-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2040331" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free in WebCore::Frame::page", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-45483" }, { "category": "external", "summary": "RHBZ#2040331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040331" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-45483", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45483" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45483", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45483" } ], "release_date": "2021-12-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free in WebCore::Frame::page" }, { "cve": "CVE-2022-0108", "discovery_date": "2022-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2037469" } ], "notes": [ { "category": "description", "text": "Inappropriate implementation in Navigation in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Inappropriate implementation in Navigation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0108" }, { "category": "external", "summary": "RHBZ#2037469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037469" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0108", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0108" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0108", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0108" } ], "release_date": "2022-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Inappropriate implementation in Navigation" }, { "cve": "CVE-2022-22589", "cwe": { "id": "CWE-1173", "name": "Improper Use of Validation Framework" }, "discovery_date": "2022-02-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053179" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. The vulnerability exists due to improper input validation in WebKit when processing email messages. This flaw allows a remote attacker to trick the victim into opening a specially crafted email message and execute arbitrary JavaScript code.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 6 and 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22589" }, { "category": "external", "summary": "RHBZ#2053179", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053179" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22589", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22589" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22589", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22589" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0002.html", "url": "https://webkitgtk.org/security/WSA-2022-0002.html" } ], "release_date": "2022-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript" }, { "cve": "CVE-2022-22590", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-02-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053181" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in WebKitGTK. The vulnerability occurs when processing HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, trigger a use-after-free error and execute arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 6 and 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22590" }, { "category": "external", "summary": "RHBZ#2053181", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053181" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22590", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22590" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22590", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22590" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0002.html", "url": "https://webkitgtk.org/security/WSA-2022-0002.html" } ], "release_date": "2022-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2022-22592", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "discovery_date": "2022-02-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053185" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. The flaw exists due to a logic issue when processing HTML content in WebKit. This flaw allows a remote attacker to create a specially crafted web page, trick the victim into visiting it, and prevent the Content Security Policy from being enforced, allowing the remote attacker to bypass implemented security restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 6 and 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22592" }, { "category": "external", "summary": "RHBZ#2053185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053185" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22592", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22592" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22592", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22592" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0002.html", "url": "https://webkitgtk.org/security/WSA-2022-0002.html" } ], "release_date": "2022-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced" }, { "cve": "CVE-2022-22594", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2045291" } ], "notes": [ { "category": "description", "text": "A cross-origin issue in the IndexDB API was addressed with improved input validation. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. A website may be able to track sensitive user information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A malicious website may exfiltrate data cross-origin", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22594" }, { "category": "external", "summary": "RHBZ#2045291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045291" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22594", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22594" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22594", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22594" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A malicious website may exfiltrate data cross-origin" }, { "cve": "CVE-2022-22620", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-02-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2056474" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in WebKitGTK. The vulnerability occurs when processing HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, triggering a use-after-free error and leading to the execution of arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22620" }, { "category": "external", "summary": "RHBZ#2056474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056474" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22620", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22620" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0003.html", "url": "https://webkitgtk.org/security/WSA-2022-0003.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2022-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-02-11T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free" }, { "cve": "CVE-2022-22624", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2073893" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22624" }, { "category": "external", "summary": "RHBZ#2073893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073893" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22624", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22624" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22624", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22624" } ], "release_date": "2022-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-22628", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2073896" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22628" }, { "category": "external", "summary": "RHBZ#2073896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073896" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22628", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22628" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22628", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22628" } ], "release_date": "2022-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-22629", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2073899" } ], "notes": [ { "category": "description", "text": "A buffer overflow vulnerability was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Buffer overflow leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22629" }, { "category": "external", "summary": "RHBZ#2073899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073899" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22629", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22629" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22629", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22629" } ], "release_date": "2022-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Buffer overflow leading to arbitrary code execution" }, { "cve": "CVE-2022-22637", "discovery_date": "2022-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2073903" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process unexpected cross-origin attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: logic issue was addressed with improved state management", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22637" }, { "category": "external", "summary": "RHBZ#2073903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073903" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22637", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22637" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22637", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22637" } ], "release_date": "2022-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: logic issue was addressed with improved state management" }, { "cve": "CVE-2022-22662", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2104787" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK, where an issue occurs due to improper cookie management. This flaw allows a remote attacker to trick the victim into parsing maliciously crafted web content, triggering the vulnerability and gaining access to potentially sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Cookie management issue leading to sensitive user information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nSince Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22662" }, { "category": "external", "summary": "RHBZ#2104787", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104787" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22662", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22662" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22662", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22662" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0006.html", "url": "https://webkitgtk.org/security/WSA-2022-0006.html" } ], "release_date": "2022-07-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Cookie management issue leading to sensitive user information disclosure" }, { "cve": "CVE-2022-22677", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2104788" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This issue occurs due to a logic issue in video self-preview feature in a webRTC call, which can be interrupted if the user answers a phone call or the audio capture is interrupted. This flaw allows a remote attacker to perform a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: the video in a webRTC call may be interrupted if the audio capture gets interrupted", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability does not affect RHEL because WebRTC code is not included in any WebKitGTK releases thus far.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22677" }, { "category": "external", "summary": "RHBZ#2104788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22677", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22677" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22677", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22677" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0006.html", "url": "https://webkitgtk.org/security/WSA-2022-0006.html" } ], "release_date": "2022-07-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "webkitgtk: the video in a webRTC call may be interrupted if the audio capture gets interrupted" }, { "cve": "CVE-2022-26700", "cwe": { "id": "CWE-1173", "name": "Improper Use of Validation Framework" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092732" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, leading to memory corruption. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26700" }, { "category": "external", "summary": "RHBZ#2092732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092732" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26700", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26700" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26700", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26700" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-26709", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092733" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a use-after-free vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26709" }, { "category": "external", "summary": "RHBZ#2092733", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092733" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26709", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26709" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26709", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26709" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-26710", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2104789" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in WebKitGTK. The flaw occurs when processing maliciously crafted HTML content in WebKit. This flaw allows a remote attacker to trick the victim into visiting a specially crafted website, triggering memory corruption and executing arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nSince Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26710" }, { "category": "external", "summary": "RHBZ#2104789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104789" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26710", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26710" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26710", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26710" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0006.html", "url": "https://webkitgtk.org/security/WSA-2022-0006.html" } ], "release_date": "2022-07-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-26716", "cwe": { "id": "CWE-1173", "name": "Improper Use of Validation Framework" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092734" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26716" }, { "category": "external", "summary": "RHBZ#2092734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092734" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26716", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26716" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26716", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26716" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-26717", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092735" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a use-after-free vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26717" }, { "category": "external", "summary": "RHBZ#2092735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092735" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26717", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26717" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-26719", "cwe": { "id": "CWE-1173", "name": "Improper Use of Validation Framework" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092736" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to memory corruption. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26719" }, { "category": "external", "summary": "RHBZ#2092736", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092736" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26719", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26719" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26719", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26719" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-30293", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-05-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2082548" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow vulnerability was found in WebKitGTK. The vulnerability occurs when processing or rendering HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, triggering a heap buffer overflow error and leading to the execution of arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30293" }, { "category": "external", "summary": "RHBZ#2082548", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082548" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30293", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30293" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30293", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30293" } ], "release_date": "2022-05-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution" }, { "cve": "CVE-2022-30294", "discovery_date": "2022-05-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2082544" } ], "notes": [ { "category": "description", "text": "[REJECTED CVE] In WebKitGTK through 2.36.0 (and WPE WebKit), there is a use-after-free in WebCore::TextureMapperLayer::setContentsLayer in WebCore/platform/graphics/texmap/TextureMapperLayer.cpp.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: heap-buffer-overflow in WebCore::TextureMapperLayer::setContentsLayer", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw was found to be a duplicate of CVE-2022-30293. Please see https://access.redhat.com/security/cve/CVE-2022-30293 for information about affected products and security errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30294" }, { "category": "external", "summary": "RHBZ#2082544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082544" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30294", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30294" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30294", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30294" } ], "release_date": "2022-05-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 0.0, "baseSeverity": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "title": "webkitgtk: heap-buffer-overflow in WebCore::TextureMapperLayer::setContentsLayer" }, { "cve": "CVE-2022-32792", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238973" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkit. This issue occurs when processing maliciously crafted web content which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32792" }, { "category": "external", "summary": "RHBZ#2238973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238973" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32792", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32792" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32792", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32792" }, { "category": "external", "summary": "https://wpewebkit.org/security/WSA-2022-0007.html", "url": "https://wpewebkit.org/security/WSA-2022-0007.html" } ], "release_date": "2022-07-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2022-32816", "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238975" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkit. This issue occurs when visiting a website that frames malicious content, which may lead to UI spoofing.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: malicious content may lead to UI spoofing", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32816" }, { "category": "external", "summary": "RHBZ#2238975", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238975" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32816", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32816" }, { "category": "external", "summary": "https://wpewebkit.org/security/WSA-2022-0007.html", "url": "https://wpewebkit.org/security/WSA-2022-0007.html" } ], "release_date": "2022-07-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: malicious content may lead to UI spoofing" }, { "cve": "CVE-2022-32885", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2023-09-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2236842" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This security issue occurs when processing maliciously crafted web content that may lead to arbitrary code execution. This memory corruption issue was addressed with improved validation.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue when processing web content", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32885" }, { "category": "external", "summary": "RHBZ#2236842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32885", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0003.html", "url": "https://webkitgtk.org/security/WSA-2023-0003.html" } ], "release_date": "2023-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue when processing web content" }, { "cve": "CVE-2022-32886", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2022-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128643" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtkm, where a buffer overflow issue was addressed with improved memory handling. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: buffer overflow issue was addressed with improved memory handling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32886" }, { "category": "external", "summary": "RHBZ#2128643", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128643" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32886", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32886" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0009.html", "url": "https://webkitgtk.org/security/WSA-2022-0009.html" } ], "release_date": "2022-09-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: buffer overflow issue was addressed with improved memory handling" }, { "cve": "CVE-2022-32888", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2140501" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where an out-of-bounds read was addressed with improved bounds checking. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: out-of-bounds write issue was addressed with improved bounds checking", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32888" }, { "category": "external", "summary": "RHBZ#2140501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140501" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32888", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32888" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0010.html", "url": "https://webkitgtk.org/security/WSA-2022-0010.html" } ], "release_date": "2022-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: out-of-bounds write issue was addressed with improved bounds checking" }, { "cve": "CVE-2022-32891", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128647" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where an issue was addressed with improved UI handling. Visiting a website that frames malicious content may lead to UI spoofing.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: UI spoofing while Visiting a website that frames malicious content", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32891" }, { "category": "external", "summary": "RHBZ#2128647", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128647" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32891", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32891" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32891", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32891" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0009.html", "url": "https://webkitgtk.org/security/WSA-2022-0009.html" } ], "release_date": "2022-09-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: UI spoofing while Visiting a website that frames malicious content" }, { "cve": "CVE-2022-32893", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2121645" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, leading to an out-of-bounds write. This flaw allows an attacker with network access to pass specially crafted web content files, causing arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Since Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32893" }, { "category": "external", "summary": "RHBZ#2121645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32893", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32893" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32893", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32893" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0008.html", "url": "https://webkitgtk.org/security/WSA-2022-0008.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2022-08-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-08-18T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2022-32912", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2022-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128645" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where an out-of-bounds read was addressed with improved bounds checking. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: out-of-bounds read was addressed with improved bounds checking", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32912" }, { "category": "external", "summary": "RHBZ#2128645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32912", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32912" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32912", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32912" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0009.html", "url": "https://webkitgtk.org/security/WSA-2022-0009.html" } ], "release_date": "2022-09-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: out-of-bounds read was addressed with improved bounds checking" }, { "cve": "CVE-2022-32919", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271437" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK and WPE WebKit that allows a remote attacker to conduct spoofing attacks by exploiting improper UI handling. This flaw enables attackers to create specially crafted websites that can display misleading information to users. By exploiting this vulnerability, an attacker can trick users into believing they are interacting with a legitimate website, potentially leading to a UI spoofing attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32919" }, { "category": "external", "summary": "RHBZ#2271437", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271437" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32919", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32919" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32919", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32919" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing." }, { "cve": "CVE-2022-32923", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2022-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2140502" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. Processing maliciously crafted web content may disclose the internal states of the app.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: correctness issue in the JIT was addressed with improved checks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32923" }, { "category": "external", "summary": "RHBZ#2140502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140502" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32923", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32923" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0010.html", "url": "https://webkitgtk.org/security/WSA-2022-0010.html" } ], "release_date": "2022-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: correctness issue in the JIT was addressed with improved checks" }, { "cve": "CVE-2022-32933", "cwe": { "id": "CWE-841", "name": "Improper Enforcement of Behavioral Workflow" }, "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271441" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk where a website may be able to track the websites a user visited in private browsing mode.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A website may able to track visited websites in private browsing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32933" }, { "category": "external", "summary": "RHBZ#2271441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271441" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32933", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32933" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32933", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32933" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A website may able to track visited websites in private browsing" }, { "cve": "CVE-2022-42799", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "discovery_date": "2022-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2140503" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where an issue was addressed with improved UI handling. Visiting a website that frames malicious content may lead to UI spoofing.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: issue was addressed with improved UI handling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42799" }, { "category": "external", "summary": "RHBZ#2140503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140503" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42799", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42799" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42799", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42799" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0010.html", "url": "https://webkitgtk.org/security/WSA-2022-0010.html" } ], "release_date": "2022-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: issue was addressed with improved UI handling" }, { "cve": "CVE-2022-42823", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2022-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2140505" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where a logic issue was addressed with improved state management. Processing maliciously crafted web content may disclose sensitive user information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: type confusion issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42823" }, { "category": "external", "summary": "RHBZ#2140505", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140505" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42823", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42823" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42823", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42823" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0010.html", "url": "https://webkitgtk.org/security/WSA-2022-0010.html" } ], "release_date": "2022-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: type confusion issue leading to arbitrary code execution" }, { "cve": "CVE-2022-42824", "discovery_date": "2022-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2140504" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where a type confusion issue was addressed with improved memory handling. By this security flaw processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: sensitive information disclosure issue", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42824" }, { "category": "external", "summary": "RHBZ#2140504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140504" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42824", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42824" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42824", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42824" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0010.html", "url": "https://webkitgtk.org/security/WSA-2022-0010.html" } ], "release_date": "2022-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: sensitive information disclosure issue" }, { "cve": "CVE-2022-42826", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2167716" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This issue exists due to a use-after-free error when processing maliciously crafted web content in WebKit. This may allow an attacker to trick the victim to visit a specially crafted website, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42826" }, { "category": "external", "summary": "RHBZ#2167716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167716" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42826", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42826" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42826", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42826" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0001.html", "url": "https://webkitgtk.org/security/WSA-2023-0001.html" } ], "release_date": "2023-02-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: use-after-free issue leading to arbitrary code execution" }, { "cve": "CVE-2022-42852", "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156986" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory disclosure issue was addressed with improved memory handling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42852" }, { "category": "external", "summary": "RHBZ#2156986", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156986" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42852", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42852" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42852", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42852" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: memory disclosure issue was addressed with improved memory handling" }, { "cve": "CVE-2022-42856", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2022-12-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2153683" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where a type confusion issue was addressed with improved memory handling. By this security flaw processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42856" }, { "category": "external", "summary": "RHBZ#2153683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153683" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42856", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42856" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42856", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42856" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2022-12-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Setting the environment variable JSC_useFTLJIT=0 will disable the vulnerable code. (This will also somewhat slow down JavaScript execution.)", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-12-14T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution" }, { "cve": "CVE-2022-42863", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156987" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42863" }, { "category": "external", "summary": "RHBZ#2156987", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156987" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42863", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42863" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42863", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42863" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-42867", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156989" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42867" }, { "category": "external", "summary": "RHBZ#2156989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156989" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42867", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42867" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42867", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42867" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free issue leading to arbitrary code execution" }, { "cve": "CVE-2022-46691", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156990" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46691" }, { "category": "external", "summary": "RHBZ#2156990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156990" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46691", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46691" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46691", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46691" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-46692", "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156991" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process unexpected cross-origin attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Same Origin Policy bypass issue", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46692" }, { "category": "external", "summary": "RHBZ#2156991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156991" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46692", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46692" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46692", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46692" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Same Origin Policy bypass issue" }, { "cve": "CVE-2022-46698", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156992" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows an attacker to process maliciously crafted web content that may disclose sensitive user information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: logic issue leading to user information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46698" }, { "category": "external", "summary": "RHBZ#2156992", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156992" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46698", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46698" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46698", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46698" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: logic issue leading to user information disclosure" }, { "cve": "CVE-2022-46699", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156993" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46699" }, { "category": "external", "summary": "RHBZ#2156993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156993" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46699", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46699" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46699", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46699" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-46700", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156994" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46700" }, { "category": "external", "summary": "RHBZ#2156994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156994" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46700", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46700" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46700", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46700" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-46705", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271444" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This flaw allows a remote attacker to bypass security restrictions and spoof the user\u0027s address bar. This issue occurs when a victim is persuaded to access a specially crafted website due to improper handling of URLs.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Visiting a malicious website may lead to address bar spoofing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46705" }, { "category": "external", "summary": "RHBZ#2271444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271444" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46705", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46705" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46705", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46705" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Visiting a malicious website may lead to address bar spoofing" }, { "cve": "CVE-2022-46725", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271446" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This flaw occurs due to an issue in the component URL Handler, which allows a remote attacker to manipulate an unknown input that can lead to clickjacking.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Visiting a malicious website may lead to address bar spoofing.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46725" }, { "category": "external", "summary": "RHBZ#2271446", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271446" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46725", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46725" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46725", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46725" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Visiting a malicious website may lead to address bar spoofing." }, { "cve": "CVE-2022-48503", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2023-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2218623" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: improper bounds checking leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-48503" }, { "category": "external", "summary": "RHBZ#2218623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218623" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-48503", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48503" } ], "release_date": "2023-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: improper bounds checking leading to arbitrary code execution" }, { "cve": "CVE-2023-23517", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2167717" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. This may allow a remote attacker to create a specially crafted web page, trick the victim into opening it, trigger memory corruption, and execute arbitrary code on the target system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-23517" }, { "category": "external", "summary": "RHBZ#2167717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167717" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-23517", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23517" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0001.html", "url": "https://webkitgtk.org/security/WSA-2023-0001.html" } ], "release_date": "2023-02-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2023-23518", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2167715" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption, and execute arbitrary code on the target system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-23518" }, { "category": "external", "summary": "RHBZ#2167715", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167715" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-23518", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23518" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0001.html", "url": "https://webkitgtk.org/security/WSA-2023-0001.html" } ], "release_date": "2023-02-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2023-23529", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2169934" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. This may, in theory, allow a remote attacker to create a specially crafted web page, trick the victim into opening it, trigger type confusion, and execute arbitrary code on the target system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-23529" }, { "category": "external", "summary": "RHBZ#2169934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2169934" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-23529", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23529" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23529", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23529" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0002.html", "url": "https://webkitgtk.org/security/WSA-2023-0002.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-02-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Setting the environment variable JSC_useDFGJIT=0 will mitigate this issue.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-02-14T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution" }, { "cve": "CVE-2023-25358", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2175099" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability in WebCore::RenderLayer::addChild in WebKitGTK before 2.36.8 allows attackers to execute code remotely.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-25358" }, { "category": "external", "summary": "RHBZ#2175099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-25358", "url": "https://www.cve.org/CVERecord?id=CVE-2023-25358" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25358", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25358" }, { "category": "external", "summary": "https://bugs.webkit.org/show_bug.cgi?id=242683", "url": "https://bugs.webkit.org/show_bug.cgi?id=242683" } ], "release_date": "2022-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild()" }, { "cve": "CVE-2023-27932", "cwe": { "id": "CWE-942", "name": "Permissive Cross-domain Policy with Untrusted Domains" }, "discovery_date": "2023-09-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2236843" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This security issue occurs when processing maliciously crafted web content that may bypass the same-origin Policy.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Same Origin Policy bypass via crafted web content", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-27932" }, { "category": "external", "summary": "RHBZ#2236843", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236843" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-27932", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27932" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-27932", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27932" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0003.html", "url": "https://webkitgtk.org/security/WSA-2023-0003.html" } ], "release_date": "2023-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Same Origin Policy bypass via crafted web content" }, { "cve": "CVE-2023-27954", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-09-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2236844" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This security issue leads to tracking sensitive user information via a website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Website may be able to track sensitive user information", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-27954" }, { "category": "external", "summary": "RHBZ#2236844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236844" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-27954", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27954" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-27954", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27954" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0003.html", "url": "https://webkitgtk.org/security/WSA-2023-0003.html" } ], "release_date": "2023-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Website may be able to track sensitive user information" }, { "cve": "CVE-2023-28198", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238943" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. When processing web content, it may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use after free vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as the WebKitGTK package is shipped as a dependency for the Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-28198" }, { "category": "external", "summary": "RHBZ#2238943", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238943" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-28198", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28198" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0008.html", "url": "https://webkitgtk.org/security/WSA-2023-0008.html" } ], "release_date": "2023-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use after free vulnerability" }, { "cve": "CVE-2023-28204", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2023-05-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2209208" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. An out of bounds read may be possible when processing malicious web content, which can lead to information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: an out-of-bounds read when processing malicious content", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-28204" }, { "category": "external", "summary": "RHBZ#2209208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209208" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-28204", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28204" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-05-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-05-22T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: an out-of-bounds read when processing malicious content" }, { "cve": "CVE-2023-28205", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2185724" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. An improper input validation issue may lead to a use-after-free vulnerability. This vulnerability allows attackers with network access to pass specially crafted web content files, causing Denial of Service or Arbitrary Code Execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "WebKitGTK: use-after-free leads to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-28205" }, { "category": "external", "summary": "RHBZ#2185724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-28205", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28205" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28205", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28205" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-6qjh-p74q-89mv", "url": "https://github.com/advisories/GHSA-6qjh-p74q-89mv" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-04-10T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "WebKitGTK: use-after-free leads to arbitrary code execution" }, { "cve": "CVE-2023-32359", "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271449" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk where a user\u2019s password may be read aloud by a text-to-speech accessibility feature.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: User password may be read aloud by a text-to-speech accessibility feature", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32359" }, { "category": "external", "summary": "RHBZ#2271449", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271449" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32359", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32359" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32359", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32359" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: User password may be read aloud by a text-to-speech accessibility feature" }, { "cve": "CVE-2023-32370", "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238944" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkit. A logic issue was addressed with improved validation.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: content security policy blacklist failure", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as \u0027Moderate\u0027 as the WebKitGTK package is shipped as a dependency for the Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32370" }, { "category": "external", "summary": "RHBZ#2238944", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238944" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32370", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32370" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32370", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32370" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0008.html", "url": "https://webkitgtk.org/security/WSA-2023-0008.html" } ], "release_date": "2023-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: content security policy blacklist failure" }, { "cve": "CVE-2023-32373", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-05-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2209214" } ], "notes": [ { "category": "description", "text": "A use after free vulnerability was found in the webkitgtk package. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: a use-after-free when processing maliciously crafted web content", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32373" }, { "category": "external", "summary": "RHBZ#2209214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209214" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32373", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32373" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32373", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32373" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-05-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-05-22T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: a use-after-free when processing maliciously crafted web content" }, { "cve": "CVE-2023-32393", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-07-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2224608" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32393" }, { "category": "external", "summary": "RHBZ#2224608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2224608" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32393", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32393" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32393", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32393" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0006.html", "url": "https://webkitgtk.org/security/WSA-2023-0006.html" } ], "release_date": "2023-07-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-32435", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2023-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2218626" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32435" }, { "category": "external", "summary": "RHBZ#2218626", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218626" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32435", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32435" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32435", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32435" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0005.html", "url": "https://webkitgtk.org/security/WSA-2023-0005.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "This vulnerability can be mitigated by setting the environment variable JSC_useWebAssembly=0, which will disable support for WebAssembly. It\u0027s not necessary to set this environment variable if you\u0027re already using JavaScriptCoreUseJIT=0 to mitigate other CVEs because WebAssembly depends on JIT.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-06-23T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2023-32439", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2023-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2218640" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. This issue occurs when processing maliciously crafted web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: type confusion issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32439" }, { "category": "external", "summary": "RHBZ#2218640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218640" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32439", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32439" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32439", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32439" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0005.html", "url": "https://webkitgtk.org/security/WSA-2023-0005.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "This vulnerability can be mitigated by setting the environment variable JSC_useDFGJIT=0, which will disable the data flow graph JIT tier. It\u0027s not necessary to set this environment variable if you\u0027re already using JavaScriptCoreUseJIT=0 to mitigate other CVEs.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-06-23T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: type confusion issue leading to arbitrary code execution" }, { "cve": "CVE-2023-35074", "discovery_date": "2023-09-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241403" } ], "notes": [ { "category": "description", "text": "The issue was addressed with improved memory handling. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "The webkitgtk versions as shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this vulnerability. This flaw relies on webkitgtk\u0027s JIT to be enabled while this feature was previously disabled in Red Hat Enterprise Linux 8 and 9 by the following erratas:\n\nRed Hat Enterprise Linux 8: https://access.redhat.com/errata/RHSA-2023:4202\nRed Hat Enterprise Linux 9: https://access.redhat.com/errata/RHSA-2023:4201", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-35074" }, { "category": "external", "summary": "RHBZ#2241403", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241403" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-35074", "url": "https://www.cve.org/CVERecord?id=CVE-2023-35074" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-35074", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-35074" } ], "release_date": "2023-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-37450", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2023-07-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2223000" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-37450" }, { "category": "external", "summary": "RHBZ#2223000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223000" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-37450", "url": "https://www.cve.org/CVERecord?id=CVE-2023-37450" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-37450", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37450" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "This vulnerability can be mitigated by setting the environment variable JSC_useWebAssembly=0, which will disable support for WebAssembly. It\u0027s not necessary to set this environment variable if you\u0027re already using JavaScriptCoreUseJIT=0 to mitigate other CVEs because WebAssembly depends on JIT.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-07-13T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-38133", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231015" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK, which exists due to excessive data output in WebKit Process Model. This issue occurs when processing malicious web content, which may lead to sensitive information disclosure to unauthorized attackers.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: disclose sensitive information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38133" }, { "category": "external", "summary": "RHBZ#2231015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231015" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38133", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38133" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38133", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38133" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: disclose sensitive information" }, { "cve": "CVE-2023-38572", "cwe": { "id": "CWE-942", "name": "Permissive Cross-domain Policy with Untrusted Domains" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231028" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This flaw exists due to an error when handling the Same Origin Policy. A remote attacker can bypass Same Origin Policy restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: bypass Same Origin Policy", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38572" }, { "category": "external", "summary": "RHBZ#2231028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231028" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38572", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38572" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38572", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38572" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: bypass Same Origin Policy" }, { "cve": "CVE-2023-38592", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231017" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38592" }, { "category": "external", "summary": "RHBZ#2231017", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231017" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38592", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38592" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38592", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38592" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-38594", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231018" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38594" }, { "category": "external", "summary": "RHBZ#2231018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231018" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38594", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38594" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38594", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38594" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-38595", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231019" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38595" }, { "category": "external", "summary": "RHBZ#2231019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231019" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38595", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38595" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38595", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38595" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-38597", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231043" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38597" }, { "category": "external", "summary": "RHBZ#2231043", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231043" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38597", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38597" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38597", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38597" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-38599", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231020" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK, which exists due to a logic issue in WebKit related to a user\u0027s privacy. A remote attacker may be able to track sensitive user information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: track sensitive user information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38599" }, { "category": "external", "summary": "RHBZ#2231020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231020" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38599", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38599" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38599", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38599" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: track sensitive user information" }, { "cve": "CVE-2023-38600", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231021" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38600" }, { "category": "external", "summary": "RHBZ#2231021", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231021" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38600", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38600" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38600", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38600" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-38611", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231022" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38611" }, { "category": "external", "summary": "RHBZ#2231022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231022" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38611", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38611" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38611", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38611" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-39928", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-09-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241400" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in the WebKitGTK\u0027s MediaRecorder API that may lead to memory corruption and Remote Code Execution. The victim needs to access a malicious web page to trigger this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-39928" }, { "category": "external", "summary": "RHBZ#2241400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241400" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-39928", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39928" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39928", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39928" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0009.html", "url": "https://webkitgtk.org/security/WSA-2023-0009.html" } ], "release_date": "2023-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports" }, { "cve": "CVE-2023-40397", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238945" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to cause arbitrary javascript code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary javascript code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40397" }, { "category": "external", "summary": "RHBZ#2238945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40397", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40397" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397" }, { "category": "external", "summary": "https://wpewebkit.org/security/WSA-2023-0008.html", "url": "https://wpewebkit.org/security/WSA-2023-0008.html" } ], "release_date": "2023-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: arbitrary javascript code execution" }, { "cve": "CVE-2023-40414", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270143" } ], "notes": [ { "category": "description", "text": "A vulnerability in WebKitGTK and WPE WebKit could allow an attacker to execute arbitrary code on a target system. The issue arises from a use-after-free flaw in memory management when processing web content. This flaw can potentially give attackers the ability to take control of affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated Imporatant because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40414" }, { "category": "external", "summary": "RHBZ#2270143", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270143" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40414", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40414" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40414", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40414" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0001.html", "url": "https://webkitgtk.org/security/WSA-2024-0001.html" } ], "release_date": "2024-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-40451", "discovery_date": "2023-09-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241409" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. An attacker may be able to execute JavaScript code to trigger Remote Code Execution, resulting in a high impact on data confidentiality, integrity, and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: attacker with JavaScript execution may be able to execute arbitrary code", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40451" }, { "category": "external", "summary": "RHBZ#2241409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241409" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40451", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40451" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40451", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40451" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0009.html", "url": "https://webkitgtk.org/security/WSA-2023-0009.html" } ], "release_date": "2023-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: attacker with JavaScript execution may be able to execute arbitrary code" }, { "cve": "CVE-2023-41074", "discovery_date": "2023-09-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241412" } ], "notes": [ { "category": "description", "text": "The issue was addressed with improved checks. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "The webkitgtk versions as shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this vulnerability. This flaw relies on webkitgtk\u0027s JIT to be enabled while this feature was previously disabled in Red Hat Enterprise Linux 8 and 9 by the following erratas:\n\nRed Hat Enterprise Linux 8: https://access.redhat.com/errata/RHSA-2023:4202\nRed Hat Enterprise Linux 9: https://access.redhat.com/errata/RHSA-2023:4201", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-41074" }, { "category": "external", "summary": "RHBZ#2241412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241412" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-41074", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41074" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41074", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41074" } ], "release_date": "2023-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-41983", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271453" } ], "notes": [ { "category": "description", "text": "A vulnerability in WebKitGTK and WPE WebKit may result in a denial-of-service when processing web content. This issue arises from improper memory handling, which could be exploited by attackers to crash the affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to a denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-41983" }, { "category": "external", "summary": "RHBZ#2271453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271453" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-41983", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41983" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41983", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41983" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing web content may lead to a denial of service" }, { "cve": "CVE-2023-41993", "discovery_date": "2023-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2240522" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing malicious web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue doesn\u0027t affect the versions of webkitgtk as shipped with Red Hat Enterprise Linux 8 and 9 as the flaw relies on JIT engine. JIT was disabled in the past when the fixes for CVE-2023-32435 and CVE-2023-32439 were released.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-41993" }, { "category": "external", "summary": "RHBZ#2240522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240522" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-41993", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41993" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41993", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41993" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-09-25T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing malicious web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42833", "discovery_date": "2024-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270146" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This flaw allows a remote attacker to trigger arbitrary code execution by persuading a victim to visit a specially crafted website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated Important because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42833" }, { "category": "external", "summary": "RHBZ#2270146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270146" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42833", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42833" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42833", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42833" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0001.html", "url": "https://webkitgtk.org/security/WSA-2024-0001.html" } ], "release_date": "2024-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42843", "discovery_date": "2024-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271717" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit that may allow a remote attacker to conduct spoofing attacks by exploiting an inconsistent user interface issue. By tricking a victim into visiting a specially crafted website, the attacker could perform address bar spoofing.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: visiting a malicious website may lead to address bar spoofing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42843" }, { "category": "external", "summary": "RHBZ#2271717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271717" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42843", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42843" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0002.html", "url": "https://webkitgtk.org/security/WSA-2024-0002.html" } ], "release_date": "2024-03-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: visiting a malicious website may lead to address bar spoofing" }, { "cve": "CVE-2023-42852", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271456" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated important because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42852" }, { "category": "external", "summary": "RHBZ#2271456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42852", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42852" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42875", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-15T12:59:19.828000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366497" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42875" }, { "category": "external", "summary": "RHBZ#2366497", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366497" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42875", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42875" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42883", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2023-12-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2254326" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue exists due to a boundary error when processing a malicious image, which could result in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing a malicious image may lead to a denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42883" }, { "category": "external", "summary": "RHBZ#2254326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254326" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42883", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42883" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42883", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42883" } ], "release_date": "2023-12-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing a malicious image may lead to a denial of service" }, { "cve": "CVE-2023-42890", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2023-12-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2254327" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue exists due to a boundary error when processing malicious HTML content in WebKit, which could result in memory corruption and arbitrary code execution on the target system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing malicious web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "While the discovered flaw in WebKitGTK does indeed present a concerning potential for arbitrary code execution due to memory corruption, its severity is assessed as moderate rather than critical for several reasons. Firstly, successful exploitation of the vulnerability requires the user to interact with malicious HTML content, typically through visiting a compromised website. This dependency on user interaction reduces the likelihood of widespread exploitation compared to vulnerabilities that can be remotely exploited without user interaction. Additionally, the impact of the flaw may be mitigated by various security measures such as sandboxing or Content Security Policy (CSP) enforcement, which can limit the execution environment for potentially malicious code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42890" }, { "category": "external", "summary": "RHBZ#2254327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254327" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42890", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42890" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42890", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42890" } ], "release_date": "2023-12-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing malicious web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42916", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-12-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2253054" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content may cause an out-of-bounds read due to an improper input validation, resulting in sensitive content leaking.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Out-of-bounds read leads to sensitive data leak", "title": "Vulnerability summary" }, { "category": "other", "text": "The WebKitGTK package versions, as shipped with Red Hat Enterprise 8 and 9, are not affected by this vulnerability. This flaw is related to the JIT code, which is currently disabled by default on both Red Hat Enterprise Linux versions.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42916" }, { "category": "external", "summary": "RHBZ#2253054", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253054" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42916", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42916" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42916", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42916" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-12-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-12-04T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Out-of-bounds read leads to sensitive data leak" }, { "cve": "CVE-2023-42917", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-12-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2253058" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Arbitrary Remote Code Execution", "title": "Vulnerability summary" }, { "category": "other", "text": "All versions of Red Hat Enterprise Linux are affected to this vulnerability. To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42917" }, { "category": "external", "summary": "RHBZ#2253058", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42917", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42917" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0011.html", "url": "https://webkitgtk.org/security/WSA-2023-0011.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-12-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-12-04T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Arbitrary Remote Code Execution" }, { "cve": "CVE-2023-42950", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271718" } ], "notes": [ { "category": "description", "text": "A heap use-after-free vulnerability was found in WebKit. Exploiting this flaw involves processing maliciously crafted web content, which may result in arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: heap use-after-free may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is Imporatant because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42950" }, { "category": "external", "summary": "RHBZ#2271718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271718" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42950", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42950" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42950", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42950" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0002.html", "url": "https://webkitgtk.org/security/WSA-2024-0002.html" } ], "release_date": "2024-03-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkit: heap use-after-free may lead to arbitrary code execution" }, { "cve": "CVE-2023-42956", "discovery_date": "2024-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271719" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This issue may allow an attacker to trigger a denial of service condition by convincing a victim to visit a specially crafted website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: processing malicious web content may lead to a denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42956" }, { "category": "external", "summary": "RHBZ#2271719", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271719" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42956", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42956" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42956", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42956" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0002.html", "url": "https://webkitgtk.org/security/WSA-2024-0002.html" } ], "release_date": "2024-03-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: processing malicious web content may lead to a denial of service" }, { "cve": "CVE-2023-42970", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-15T13:01:32.590000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366498" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42970" }, { "category": "external", "summary": "RHBZ#2366498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366498" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42970", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42970" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-4558", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-05-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2279689" } ], "notes": [ { "category": "description", "text": "Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in ANGLE", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-4558" }, { "category": "external", "summary": "RHBZ#2279689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4558", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558" } ], "release_date": "2024-05-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in ANGLE" }, { "cve": "CVE-2024-23213", "discovery_date": "2024-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270141" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK\u00a0. This flaw allows a remote attacker to trigger arbitrary code execution by persuading a victim to visit a specially crafted website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated Imporatant because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23213" }, { "category": "external", "summary": "RHBZ#2270141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270141" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23213", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23213" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23213", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23213" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0001.html", "url": "https://webkitgtk.org/security/WSA-2024-0001.html" } ], "release_date": "2024-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-23222", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2024-01-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259893" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution due to a type confusion issue. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: type confusion may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw depends on the WebKitGTK JIT engine to be enabled. This feature has been disabled in Red Hat Enterprise Linux 8.8 and 9.2 by the errata RHSA-2023:4202 and RHSA-2023:4201. Therefore, Red Hat Enterprise Linux 8.8 and 9.2, when these errata are applied, and newer versions are not affected by this vulnerability.\n\nRHSA-2023:4202: https://access.redhat.com/errata/RHSA-2023:4202\nRHSA-2023:4201: https://access.redhat.com/errata/RHSA-2023:4201\n\nTo exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23222" }, { "category": "external", "summary": "RHBZ#2259893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23222", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23222" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0001.html", "url": "https://webkitgtk.org/security/WSA-2024-0001.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content. Please update the affected package as soon as possible.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2024-01-23T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: type confusion may lead to arbitrary code execution" }, { "cve": "CVE-2024-23252", "discovery_date": "2024-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270288" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows an attacker to trigger a denial of service condition by convincing a victim to visit a specially crafted website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: processing malicious web content may lead to denial-of-service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23252" }, { "category": "external", "summary": "RHBZ#2270288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270288" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23252", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23252" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23252", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23252" }, { "category": "external", "summary": "https://seclists.org/fulldisclosure/2024/Mar/21", "url": "https://seclists.org/fulldisclosure/2024/Mar/21" } ], "release_date": "2024-03-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: processing malicious web content may lead to denial-of-service" }, { "cve": "CVE-2024-23254", "discovery_date": "2024-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270289" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit, where a remote attacker is able to exfiltrate audio data cross-origin by convincing a victim to visit a specially crafted website, which results in obtaining sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: malicious website may exfiltrate audio data cross-origin", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23254" }, { "category": "external", "summary": "RHBZ#2270289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270289" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23254", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23254" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23254", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23254" }, { "category": "external", "summary": "https://seclists.org/fulldisclosure/2024/Mar/21", "url": "https://seclists.org/fulldisclosure/2024/Mar/21" } ], "release_date": "2024-03-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: malicious website may exfiltrate audio data cross-origin" }, { "cve": "CVE-2024-23263", "discovery_date": "2024-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270290" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows remote attackers to bypass security restrictions due to a logic issue by convincing a victim to visit a specially crafted website. This results in the attacker evading the Content Security Policy enforcement.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: processing malicious web content prevents Content Security Policy from being enforced", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23263" }, { "category": "external", "summary": "RHBZ#2270290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270290" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23263", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23263" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23263", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23263" }, { "category": "external", "summary": "https://seclists.org/fulldisclosure/2024/Mar/21", "url": "https://seclists.org/fulldisclosure/2024/Mar/21" } ], "release_date": "2024-03-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: processing malicious web content prevents Content Security Policy from being enforced" }, { "cve": "CVE-2024-23271", "cwe": { "id": "CWE-942", "name": "Permissive Cross-domain Policy with Untrusted Domains" }, "discovery_date": "2024-09-25T15:33:21.499000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314696" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows a remote attacker to trigger unexpected cross-origin behavior via a malicious website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A malicious website may cause unexpected cross-origin behavior", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23271" }, { "category": "external", "summary": "RHBZ#2314696", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314696" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23271", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23271" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23271", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23271" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A malicious website may cause unexpected cross-origin behavior" }, { "cve": "CVE-2024-23280", "discovery_date": "2024-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270291" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows remote attackers to bypass security restrictions through an injection issue by persuading a victim to access a specially crafted website, enabling the attackers to fingerprint the user.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: maliciously crafted webpage may be able to fingerprint the user", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23280" }, { "category": "external", "summary": "RHBZ#2270291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270291" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23280", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23280" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23280", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23280" }, { "category": "external", "summary": "https://seclists.org/fulldisclosure/2024/Mar/21", "url": "https://seclists.org/fulldisclosure/2024/Mar/21" } ], "release_date": "2024-03-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: maliciously crafted webpage may be able to fingerprint the user" }, { "cve": "CVE-2024-23284", "discovery_date": "2024-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270292" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows remote attackers to bypass security restrictions due to a logic flaw by persuading a victim to access a specially crafted website, enabling attackers to circumvent the Content Security Policy enforcement.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23284" }, { "category": "external", "summary": "RHBZ#2270292", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270292" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23284", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23284" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23284", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23284" }, { "category": "external", "summary": "https://seclists.org/fulldisclosure/2024/Mar/21", "url": "https://seclists.org/fulldisclosure/2024/Mar/21" } ], "release_date": "2024-03-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced" }, { "cve": "CVE-2024-27808", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:36:18.356000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314697" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27808" }, { "category": "external", "summary": "RHBZ#2314697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27808", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27820", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:37:48.081000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314698" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27820" }, { "category": "external", "summary": "RHBZ#2314698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27820", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27820" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27833", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:40:34.042000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314700" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient input validation, which attackers could exploit to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27833" }, { "category": "external", "summary": "RHBZ#2314700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27833", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27833" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27834", "cwe": { "id": "CWE-288", "name": "Authentication Bypass Using an Alternate Path or Channel" }, "discovery_date": "2024-05-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2282412" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Webkit. This flaw allows an attacker with arbitrary read and write capability to bypass pointer authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: pointer authentication bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27834" }, { "category": "external", "summary": "RHBZ#2282412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282412" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27834", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27834" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27834", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27834" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0003.html", "url": "https://webkitgtk.org/security/WSA-2024-0003.html" } ], "release_date": "2024-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkit: pointer authentication bypass" }, { "cve": "CVE-2024-27838", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2024-09-25T15:42:35.706000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314702" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This vulnerability allows a maliciously crafted webpage to fingerprint the user.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27838" }, { "category": "external", "summary": "RHBZ#2314702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314702" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27838", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27838" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user" }, { "cve": "CVE-2024-27851", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:44:41.235000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314704" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient bounds checks, which could be exploited by attackers to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27851" }, { "category": "external", "summary": "RHBZ#2314704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27851", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27851" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27856", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2025-02-10T09:34:34.705418+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344618" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause unexpected app termination or arbitrary code execution due to improper checks.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27856" }, { "category": "external", "summary": "RHBZ#2344618", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344618" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27856", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27856" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856" }, { "category": "external", "summary": "https://support.apple.com/en-us/120896", "url": "https://support.apple.com/en-us/120896" }, { "category": "external", "summary": "https://support.apple.com/en-us/120898", "url": "https://support.apple.com/en-us/120898" }, { "category": "external", "summary": "https://support.apple.com/en-us/120901", "url": "https://support.apple.com/en-us/120901" }, { "category": "external", "summary": "https://support.apple.com/en-us/120902", "url": "https://support.apple.com/en-us/120902" }, { "category": "external", "summary": "https://support.apple.com/en-us/120903", "url": "https://support.apple.com/en-us/120903" }, { "category": "external", "summary": "https://support.apple.com/en-us/120905", "url": "https://support.apple.com/en-us/120905" }, { "category": "external", "summary": "https://support.apple.com/en-us/120906", "url": "https://support.apple.com/en-us/120906" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0001.html", "url": "https://webkitgtk.org/security/WSA-2025-0001.html" } ], "release_date": "2025-01-15T19:35:57.075000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution" }, { "cve": "CVE-2024-40776", "discovery_date": "2024-07-30T20:48:03+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2301841" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. A use-after-free may lead to Remote Code Execution. Users are advised to avoid processing untrusted web content in WebKitGTK.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40776" }, { "category": "external", "summary": "RHBZ#2301841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40776", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40776" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html", "url": "https://webkitgtk.org/security/WSA-2024-0004.html" } ], "release_date": "2024-07-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution" }, { "cve": "CVE-2024-40779", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-07-31T15:05:50+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302070" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40779" }, { "category": "external", "summary": "RHBZ#2302070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40779", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40779" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking" }, { "cve": "CVE-2024-40780", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-07-31T15:07:22+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302069" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40780" }, { "category": "external", "summary": "RHBZ#2302069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40780", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40780" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking" }, { "cve": "CVE-2024-40782", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-07-31T14:57:24+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302071" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger a use-after-free issue due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40782" }, { "category": "external", "summary": "RHBZ#2302071", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40782", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40782" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management" }, { "cve": "CVE-2024-40789", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-07-31T15:39:05+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302067" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40789" }, { "category": "external", "summary": "RHBZ#2302067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40789", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40789" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-40866", "discovery_date": "2024-09-17T00:31:06.549134+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2312724" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows a remote attacker to conduct spoofing attacks by exploiting an inconsistent user interface issue. The attacker could perform address bar spoofing by tricking a victim into visiting a specially crafted website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Visiting a malicious website may lead to address bar spoofing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40866" }, { "category": "external", "summary": "RHBZ#2312724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40866", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40866" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40866", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40866" }, { "category": "external", "summary": "https://support.apple.com/en-us/121238", "url": "https://support.apple.com/en-us/121238" }, { "category": "external", "summary": "https://support.apple.com/en-us/121241", "url": "https://support.apple.com/en-us/121241" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-17T00:15:49.840000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Visiting a malicious website may lead to address bar spoofing" }, { "cve": "CVE-2024-44185", "cwe": { "id": "CWE-788", "name": "Access of Memory Location After End of Buffer" }, "discovery_date": "2024-11-01T20:05:39.339000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2323263" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to the program crashing. Code execution is not discarded as a consequence.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated as important severity because it allows maliciously crafted web content to crash the application, potentially leads to denial of service. While it does not compromise confidentiality or integrity, the ability to crash the program without requiring authentication poses a significant risk.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44185" }, { "category": "external", "summary": "RHBZ#2323263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44185", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44185" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0006.html", "url": "https://webkitgtk.org/security/WSA-2024-0006.html" } ], "release_date": "2024-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-44187", "discovery_date": "2024-09-25T15:50:57.927000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314706" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to exfiltrate data cross-origin by convincing a victim to visit a specially crafted website, which results in obtaining sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A malicious website may exfiltrate data cross-origin", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44187" }, { "category": "external", "summary": "RHBZ#2314706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314706" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44187", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44187" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44187", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44187" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A malicious website may exfiltrate data cross-origin" }, { "cve": "CVE-2024-44192", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2025-03-20T12:50:04.459000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2353871" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper checks.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.\n\nThis issue can cause an unexpected process crash. Additionally, there is no evidence of remote code execution but this possibility is not discarded.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44192" }, { "category": "external", "summary": "RHBZ#2353871", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353871" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44192", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44192" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44192", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44192" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0002.html", "url": "https://webkitgtk.org/security/WSA-2025-0002.html" } ], "release_date": "2025-03-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-44244", "cwe": { "id": "CWE-788", "name": "Access of Memory Location After End of Buffer" }, "discovery_date": "2024-11-01T21:06:58.389000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2323278" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to program to a crash. This issue occurs because code execution is not discarded as consequence.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44244" }, { "category": "external", "summary": "RHBZ#2323278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44244", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44244" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244" } ], "release_date": "2024-01-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-44296", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2024-11-01T21:16:26.289000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2323289" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing maliciously crafted web content may prevent the Content Security Policy from being enforced. This issue leads to items that were banned from running to be executed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44296" }, { "category": "external", "summary": "RHBZ#2323289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323289" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44296", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44296" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44296", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44296" } ], "release_date": "2024-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced" }, { "cve": "CVE-2024-44308", "discovery_date": "2024-11-21T23:02:37.337000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2327931" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in WebKitGTK\u0027s JIT compiler. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: javascriptcore: processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "In order to exploit this vulnerability, the WebKitGTK JIT engine must be enabled and an attacker needs to trick a user into processing or loading malicious web content. This feature is disabled in Red Hat Enterprise Linux versions 8 and 9, meaning these releases are not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44308" }, { "category": "external", "summary": "RHBZ#2327931", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327931" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44308", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44308" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44308", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44308" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2024-11-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nAffected installations of Red Hat Enterprise Linux 7 can disable the JIT engine by setting the JavaScriptCoreUseJIT environment variable to 0.\n\nAdditionally, in Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2024-11-21T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: javascriptcore: processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-44309", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2024-11-21T22:51:08.987000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2327927" } ], "notes": [ { "category": "description", "text": "A data isolation bypass vulnerability was discovered in WebKitGTK. Processing maliciously crafted web content could enable a cross-site scripting (XSS) attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: data isolation bypass vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated as IMPORTANT severity due to a cookie management issue that allows an attacker to inject maliciously crafted web content, potentially leading to a cross-site scripting (XSS) attack, this flaw occurs because of improper state management during cookie handling, which could allow unauthorized script execution.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44309" }, { "category": "external", "summary": "RHBZ#2327927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327927" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44309", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44309" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44309", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44309" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2024-11-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2024-11-21T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: data isolation bypass vulnerability" }, { "cve": "CVE-2024-54467", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2025-03-20T12:50:18.647000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2353872" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. A malicious website may exfiltrate data cross-origin due to a cookie management issue related to improper state management.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A malicious website may exfiltrate data cross-origin", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into visiting a malicious website.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54467" }, { "category": "external", "summary": "RHBZ#2353872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353872" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54467", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54467" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54467", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54467" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0002.html", "url": "https://webkitgtk.org/security/WSA-2025-0002.html" } ], "release_date": "2025-03-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not visit untrusted websites. Also, do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi, and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and used via a graphical interface to process untrusted web content, via GNOME, for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A malicious website may exfiltrate data cross-origin" }, { "cve": "CVE-2024-54479", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "discovery_date": "2024-12-23T13:16:54.800976+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333841" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. In affected versions of this package, processing maliciously crafted web content may lead to an unexpected process crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated as an Important severity because an attacker can process maliciously crafted web content, potentially leading to an unexpected process crash. This issue can disrupt the system stability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54479" }, { "category": "external", "summary": "RHBZ#2333841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333841" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54479", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54479" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54479", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54479" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121838", "url": "https://support.apple.com/en-us/121838" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121844", "url": "https://support.apple.com/en-us/121844" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2024-12-11T22:57:33.957000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-54502", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-12-23T13:18:24.328627+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333843" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Webkit. Processing maliciously crafted web content may lead to an unexpected process crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54502" }, { "category": "external", "summary": "RHBZ#2333843", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333843" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54502", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54502" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54502", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54502" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121844", "url": "https://support.apple.com/en-us/121844" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2024-12-11T22:58:51.903000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-54505", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2024-12-23T13:18:27.108126+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333844" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger a type confusion issue due to improper memory handling, causing memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54505" }, { "category": "external", "summary": "RHBZ#2333844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333844" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54505", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54505" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54505", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54505" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121838", "url": "https://support.apple.com/en-us/121838" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121844", "url": "https://support.apple.com/en-us/121844" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2024-12-11T22:58:31.052000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkit: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2024-54508", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-12-23T13:18:30.107103+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333845" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54508" }, { "category": "external", "summary": "RHBZ#2333845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333845" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54508", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54508" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54508", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54508" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121844", "url": "https://support.apple.com/en-us/121844" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2024-12-11T22:58:14.487000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-54534", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-12-23T13:18:32.596325+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333846" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause memory corruption due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54534" }, { "category": "external", "summary": "RHBZ#2333846", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333846" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54534", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54534" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121844", "url": "https://support.apple.com/en-us/121844" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2024-12-11T22:58:39.974000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkit: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2024-54543", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2025-02-10T09:37:24.253576+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344619" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause memory corruption due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54543" }, { "category": "external", "summary": "RHBZ#2344619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54543", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54543" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2025-01-27T21:46:30.578000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2024-54551", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2025-04-07T14:23:49.963000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357909" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a denial of service due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to a denial-of-service", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54551" }, { "category": "external", "summary": "RHBZ#2357909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357909" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54551", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54551" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing web content may lead to a denial-of-service" }, { "cve": "CVE-2024-54658", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2025-02-11T16:12:08.426000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344946" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a denial of service due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to a denial-of-service", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54658" }, { "category": "external", "summary": "RHBZ#2344946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344946" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54658", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54658" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54658", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54658" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0001.html", "url": "https://webkitgtk.org/security/WSA-2025-0001.html" } ], "release_date": "2025-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing web content may lead to a denial-of-service" }, { "cve": "CVE-2025-24143", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "discovery_date": "2025-02-10T09:40:08.138428+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344621" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. A maliciously crafted web page may be able to fingerprint the user due to improper access restrictions to the file system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into visiting a maliciously crafted web page.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24143" }, { "category": "external", "summary": "RHBZ#2344621", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344621" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24143", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24143" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24143", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24143" }, { "category": "external", "summary": "https://support.apple.com/en-us/122066", "url": "https://support.apple.com/en-us/122066" }, { "category": "external", "summary": "https://support.apple.com/en-us/122068", "url": "https://support.apple.com/en-us/122068" }, { "category": "external", "summary": "https://support.apple.com/en-us/122073", "url": "https://support.apple.com/en-us/122073" }, { "category": "external", "summary": "https://support.apple.com/en-us/122074", "url": "https://support.apple.com/en-us/122074" } ], "release_date": "2025-01-27T21:46:05.639000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not visit untrusted web pages or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user" }, { "cve": "CVE-2025-24150", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2025-02-10T09:41:46.644580+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344622" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Copying a URL from Web Inspector may lead to command injection due to improper file handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Copying a URL from Web Inspector may lead to command injection", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into performing unlikely actions, such as enabling and opening the web inspector in an application and loading malicious web content into it. For this reason, this flaw has been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24150" }, { "category": "external", "summary": "RHBZ#2344622", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344622" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24150", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24150" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24150", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24150" }, { "category": "external", "summary": "https://support.apple.com/en-us/122066", "url": "https://support.apple.com/en-us/122066" }, { "category": "external", "summary": "https://support.apple.com/en-us/122068", "url": "https://support.apple.com/en-us/122068" }, { "category": "external", "summary": "https://support.apple.com/en-us/122074", "url": "https://support.apple.com/en-us/122074" } ], "release_date": "2025-01-27T21:46:32.259000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Copying a URL from Web Inspector may lead to command injection" }, { "cve": "CVE-2025-24158", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2025-02-10T09:43:02.859455+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344623" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a denial of service due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to a denial-of-service", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24158" }, { "category": "external", "summary": "RHBZ#2344623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344623" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24158", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24158" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24158", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24158" }, { "category": "external", "summary": "https://support.apple.com/en-us/122066", "url": "https://support.apple.com/en-us/122066" }, { "category": "external", "summary": "https://support.apple.com/en-us/122068", "url": "https://support.apple.com/en-us/122068" }, { "category": "external", "summary": "https://support.apple.com/en-us/122071", "url": "https://support.apple.com/en-us/122071" }, { "category": "external", "summary": "https://support.apple.com/en-us/122072", "url": "https://support.apple.com/en-us/122072" }, { "category": "external", "summary": "https://support.apple.com/en-us/122073", "url": "https://support.apple.com/en-us/122073" }, { "category": "external", "summary": "https://support.apple.com/en-us/122074", "url": "https://support.apple.com/en-us/122074" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0001.html", "url": "https://webkitgtk.org/security/WSA-2025-0001.html" } ], "release_date": "2025-01-27T21:45:49.015000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing web content may lead to a denial-of-service" }, { "cve": "CVE-2025-24162", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2025-02-10T09:44:11.167306+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344624" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper state management.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.\n\nThis issue can cause an unexpected process crash. Additionally, there is no evidence of remote code execution but this possibility is not discarded.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24162" }, { "category": "external", "summary": "RHBZ#2344624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344624" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24162", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24162" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24162", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24162" }, { "category": "external", "summary": "https://support.apple.com/en-us/122066", "url": "https://support.apple.com/en-us/122066" }, { "category": "external", "summary": "https://support.apple.com/en-us/122068", "url": "https://support.apple.com/en-us/122068" }, { "category": "external", "summary": "https://support.apple.com/en-us/122071", "url": "https://support.apple.com/en-us/122071" }, { "category": "external", "summary": "https://support.apple.com/en-us/122072", "url": "https://support.apple.com/en-us/122072" }, { "category": "external", "summary": "https://support.apple.com/en-us/122073", "url": "https://support.apple.com/en-us/122073" }, { "category": "external", "summary": "https://support.apple.com/en-us/122074", "url": "https://support.apple.com/en-us/122074" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0001.html", "url": "https://webkitgtk.org/security/WSA-2025-0001.html" } ], "release_date": "2025-01-27T21:45:54.015000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2025-24201", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2025-03-12T22:35:00.430000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2351802" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds write due to improper checks to prevent unauthorized actions, causing a break out of Web Content sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: out-of-bounds write vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is only a risk for servers which utilize a GUI for system administration. This vulnerability can only be exploited when specific packages are used with a graphical interface to process untrusted web content, via GNOME for example.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24201" }, { "category": "external", "summary": "RHBZ#2351802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351802" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24201", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24201" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24201", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24201" }, { "category": "external", "summary": "https://support.apple.com/en-us/122281", "url": "https://support.apple.com/en-us/122281" }, { "category": "external", "summary": "https://support.apple.com/en-us/122284", "url": "https://support.apple.com/en-us/122284" }, { "category": "external", "summary": "https://support.apple.com/en-us/122285", "url": "https://support.apple.com/en-us/122285" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0002.html", "url": "https://webkitgtk.org/security/WSA-2025-0002.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2025-03-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Systems which do not rely on a GUI for system administration (commonly referred to as \"headless\") should confirm that GNOME shell and WebKitGTK are not present on the system.\n\nWebKitGTK3 is no longer used and can therefore be uninstalled without consequence.\n\nWebKitGTK4 is used in Red Hat Enterprise Linux 7 by the following packages: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nTo mitigate this vulnerability, consider removing certain GNOME packages. Note that uninstalling these packages will break functionality in GNOME, however the server can still be used via the terminal interface.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2025-03-13T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: out-of-bounds write vulnerability" }, { "cve": "CVE-2025-24208", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2025-04-07T14:26:09.363000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357910" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Loading a malicious iframe can cause a cross-site scripting attack due to permissions issues.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24208" }, { "category": "external", "summary": "RHBZ#2357910", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357910" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24208", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24208" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24208", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24208" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack" }, { "cve": "CVE-2025-24209", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2025-04-07T14:27:43.092000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357911" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a buffer overflow due to improper memory handling and result in an unexpected process crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24209" }, { "category": "external", "summary": "RHBZ#2357911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357911" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24209", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24209" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24209", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24209" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2025-24213", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2025-04-07T14:28:47.281000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357913" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a type confusion issue due to improper handling of floats and result in memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A type confusion issue could lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.\n\nThe x86_64 architecture is not vulnerable to this issue, the x86 architecture is not vulnerable when the SSE2 instruction set is enabled, all other architectures are vulnerable to this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24213" }, { "category": "external", "summary": "RHBZ#2357913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357913" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24213", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24213" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24213", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24213" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: A type confusion issue could lead to memory corruption" }, { "cve": "CVE-2025-24216", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2025-04-07T14:29:49.645000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357917" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24216" }, { "category": "external", "summary": "RHBZ#2357917", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357917" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24216", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24216" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24216", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24216" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" }, { "cve": "CVE-2025-24223", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-15T13:03:40.562000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366499" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24223" }, { "category": "external", "summary": "RHBZ#2366499", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366499" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24223", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24223" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2025-24264", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2025-04-07T14:31:23.097000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357918" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24264" }, { "category": "external", "summary": "RHBZ#2357918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24264", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24264" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" }, { "cve": "CVE-2025-30427", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-04-07T14:32:29.265000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357919" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in an unexpected process crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-30427" }, { "category": "external", "summary": "RHBZ#2357919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357919" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-30427", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30427" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-30427", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-30427" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" }, { "cve": "CVE-2025-31204", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2025-05-15T13:04:43.281000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366500" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause out-of-bounds memory access due to improper memory handling and result in memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31204" }, { "category": "external", "summary": "RHBZ#2366500", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366500" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31204", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2025-31205", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2025-05-15T13:05:47.441000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366501" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. A malicious website may steal data cross-origin due to improper security checks within the web browser or rendering engine, leading to unauthorized disclosure of information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A malicious website may exfiltrate data cross-origin", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into visiting a malicious website.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31205" }, { "category": "external", "summary": "RHBZ#2366501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366501" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31205", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31205" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31205", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31205" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not visit untrusted websites. Also, do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A malicious website may exfiltrate data cross-origin" }, { "cve": "CVE-2025-31206", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2025-05-15T13:06:54.355000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366502" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a type confusion issue due to improper state handling and result in an unexpected crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31206" }, { "category": "external", "summary": "RHBZ#2366502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366502" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31206", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31206" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" }, { "cve": "CVE-2025-31215", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2025-05-15T13:07:56.027000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366503" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a NULL pointer dereference due to improper checks, resulting in an unexpected process crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31215" }, { "category": "external", "summary": "RHBZ#2366503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366503" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31215", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31215" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2025-31257", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-15T13:08:57.791000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366504" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in an unexpected crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31257" }, { "category": "external", "summary": "RHBZ#2366504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366504" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31257", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31257" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31257", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31257" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" } ] }
ghsa-23h9-xj7q-3m7r
Vulnerability from github
Published
2025-01-28 00:32
Modified
2025-01-30 18:32
Severity ?
VLAI Severity ?
Details
The issue was addressed with improved access restrictions to the file system. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, visionOS 2.3. A maliciously crafted webpage may be able to fingerprint the user.
{ "affected": [], "aliases": [ "CVE-2025-24143" ], "database_specific": { "cwe_ids": [ "CWE-862" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-01-27T22:15:18Z", "severity": "MODERATE" }, "details": "The issue was addressed with improved access restrictions to the file system. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, visionOS 2.3. A maliciously crafted webpage may be able to fingerprint the user.", "id": "GHSA-23h9-xj7q-3m7r", "modified": "2025-01-30T18:32:05Z", "published": "2025-01-28T00:32:14Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24143" }, { "type": "WEB", "url": "https://support.apple.com/en-us/122066" }, { "type": "WEB", "url": "https://support.apple.com/en-us/122068" }, { "type": "WEB", "url": "https://support.apple.com/en-us/122073" }, { "type": "WEB", "url": "https://support.apple.com/en-us/122074" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ] }
suse-su-2025:0691-1
Vulnerability from csaf_suse
Published
2025-02-24 13:12
Modified
2025-02-24 13:12
Summary
Security update for webkit2gtk3
Notes
Title of the patch
Security update for webkit2gtk3
Description of the patch
This update for webkit2gtk3 fixes the following issues:
Update to version 2.46.6 (bsc#1236946):
- CVE-2025-24143: A maliciously crafted webpage may be able to fingerprint the user.
- CVE-2025-24150: Copying a URL from Web Inspector may lead to command injection.
- CVE-2025-24158: Processing web content may lead to a denial-of-service.
- CVE-2025-24162: Processing maliciously crafted web content may lead to an unexpected process crash.
Already fixed in previous releases:
- CVE-2024-54543: Processing maliciously crafted web content may lead to memory corruption.
- CVE-2024-27856: Processing a file may lead to unexpected app termination or arbitrary code execution.
- CVE-2024-54658: Processing web content may lead to a denial-of-service.
Patchnames
SUSE-2025-691,SUSE-SLE-Module-Basesystem-15-SP6-2025-691,SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-691,SUSE-SLE-Module-Development-Tools-15-SP6-2025-691,openSUSE-SLE-15.6-2025-691
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for webkit2gtk3", "title": "Title of the patch" }, { "category": "description", "text": "This update for webkit2gtk3 fixes the following issues:\n\nUpdate to version 2.46.6 (bsc#1236946):\n\n- CVE-2025-24143: A maliciously crafted webpage may be able to fingerprint the user.\n- CVE-2025-24150: Copying a URL from Web Inspector may lead to command injection.\n- CVE-2025-24158: Processing web content may lead to a denial-of-service.\n- CVE-2025-24162: Processing maliciously crafted web content may lead to an unexpected process crash.\n\nAlready fixed in previous releases:\n\n- CVE-2024-54543: Processing maliciously crafted web content may lead to memory corruption.\n- CVE-2024-27856: Processing a file may lead to unexpected app termination or arbitrary code execution.\n- CVE-2024-54658: Processing web content may lead to a denial-of-service.\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-691,SUSE-SLE-Module-Basesystem-15-SP6-2025-691,SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-691,SUSE-SLE-Module-Development-Tools-15-SP6-2025-691,openSUSE-SLE-15.6-2025-691", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_0691-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:0691-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250691-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:0691-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020424.html" }, { "category": "self", "summary": "SUSE Bug 1236946", "url": "https://bugzilla.suse.com/1236946" }, { "category": "self", "summary": "SUSE CVE CVE-2024-27856 page", "url": "https://www.suse.com/security/cve/CVE-2024-27856/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-54543 page", "url": "https://www.suse.com/security/cve/CVE-2024-54543/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-54658 page", "url": "https://www.suse.com/security/cve/CVE-2024-54658/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24143 page", "url": "https://www.suse.com/security/cve/CVE-2025-24143/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24150 page", "url": "https://www.suse.com/security/cve/CVE-2025-24150/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24158 page", "url": "https://www.suse.com/security/cve/CVE-2025-24158/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24162 page", "url": "https://www.suse.com/security/cve/CVE-2025-24162/" } ], "title": "Security update for webkit2gtk3", "tracking": { "current_release_date": "2025-02-24T13:12:26Z", "generator": { "date": "2025-02-24T13:12:26Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:0691-1", "initial_release_date": "2025-02-24T13:12:26Z", "revision_history": [ { "date": "2025-02-24T13:12:26Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "product": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "product_id": "libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64" } }, { "category": "product_version", "name": "libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "product": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "product_id": "libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64" } }, { "category": "product_version", "name": "libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "product": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "product_id": "libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "product": { "name": "libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "product_id": "libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "product": { "name": "libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "product_id": "libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64" } }, { "category": "product_version", "name": "libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "product": { "name": "libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "product_id": "libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "product": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "product_id": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "product": { "name": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "product_id": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "product": { "name": "typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "product_id": "typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "product": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "product_id": "typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "product": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "product_id": "typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "product_id": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "product": { "name": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "product_id": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64" } }, { "category": "product_version", "name": "webkit-jsc-4-2.46.6-150600.12.27.1.aarch64", "product": { "name": "webkit-jsc-4-2.46.6-150600.12.27.1.aarch64", "product_id": "webkit-jsc-4-2.46.6-150600.12.27.1.aarch64" } }, { "category": "product_version", "name": "webkit-jsc-4.1-2.46.6-150600.12.27.1.aarch64", "product": { "name": "webkit-jsc-4.1-2.46.6-150600.12.27.1.aarch64", "product_id": "webkit-jsc-4.1-2.46.6-150600.12.27.1.aarch64" } }, { "category": "product_version", "name": "webkit-jsc-6.0-2.46.6-150600.12.27.1.aarch64", "product": { "name": "webkit-jsc-6.0-2.46.6-150600.12.27.1.aarch64", "product_id": "webkit-jsc-6.0-2.46.6-150600.12.27.1.aarch64" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "product_id": "webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64" } }, { "category": "product_version", "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "product": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "product_id": "webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "product": { "name": "webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "product_id": "webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.aarch64", "product": { "name": "webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.aarch64", "product_id": "webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.aarch64" } }, { "category": "product_version", "name": "webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "product": { "name": "webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "product_id": "webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64" } }, { "category": "product_version", "name": "webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.aarch64", "product": { "name": "webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.aarch64", "product_id": "webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.aarch64" } }, { "category": "product_version", "name": "webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "product": { "name": "webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "product_id": "webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64" } }, { "category": "product_version", "name": "webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.aarch64", "product": { "name": "webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.aarch64", "product_id": "webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.aarch64" } }, { "category": "product_version", "name": "webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "product": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "product_id": "webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-64bit-2.46.6-150600.12.27.1.aarch64_ilp32", "product": { "name": "libjavascriptcoregtk-4_0-18-64bit-2.46.6-150600.12.27.1.aarch64_ilp32", "product_id": "libjavascriptcoregtk-4_0-18-64bit-2.46.6-150600.12.27.1.aarch64_ilp32" } }, { "category": "product_version", "name": "libjavascriptcoregtk-4_1-0-64bit-2.46.6-150600.12.27.1.aarch64_ilp32", "product": { "name": "libjavascriptcoregtk-4_1-0-64bit-2.46.6-150600.12.27.1.aarch64_ilp32", "product_id": "libjavascriptcoregtk-4_1-0-64bit-2.46.6-150600.12.27.1.aarch64_ilp32" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-64bit-2.46.6-150600.12.27.1.aarch64_ilp32", "product": { "name": "libwebkit2gtk-4_0-37-64bit-2.46.6-150600.12.27.1.aarch64_ilp32", "product_id": "libwebkit2gtk-4_0-37-64bit-2.46.6-150600.12.27.1.aarch64_ilp32" } }, { "category": "product_version", "name": "libwebkit2gtk-4_1-0-64bit-2.46.6-150600.12.27.1.aarch64_ilp32", "product": { "name": "libwebkit2gtk-4_1-0-64bit-2.46.6-150600.12.27.1.aarch64_ilp32", "product_id": "libwebkit2gtk-4_1-0-64bit-2.46.6-150600.12.27.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.i586", "product": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.i586", "product_id": "libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.i586" } }, { "category": "product_version", "name": "libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.i586", "product": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.i586", "product_id": "libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.i586" } }, { "category": "product_version", "name": "libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.i586", "product": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.i586", "product_id": "libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.i586" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.i586", "product": { "name": "libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.i586", "product_id": "libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.i586" } }, { "category": "product_version", "name": "libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.i586", "product": { "name": "libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.i586", "product_id": "libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.i586" } }, { "category": "product_version", "name": "libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.i586", "product": { "name": "libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.i586", "product_id": "libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.i586" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.i586", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.i586", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.i586" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.i586", "product": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.i586", "product_id": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.i586" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.i586", "product": { "name": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.i586", "product_id": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.i586" } }, { "category": "product_version", "name": "typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.i586", "product": { "name": "typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.i586", "product_id": "typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.i586" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.i586", "product": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.i586", "product_id": "typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.i586" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.i586", "product": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.i586", "product_id": "typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.i586" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.i586", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.i586", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.i586" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.i586", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.i586", "product_id": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.i586" } }, { "category": "product_version", "name": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.i586", "product": { "name": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.i586", "product_id": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.i586" } }, { "category": "product_version", "name": "webkit-jsc-4-2.46.6-150600.12.27.1.i586", "product": { "name": "webkit-jsc-4-2.46.6-150600.12.27.1.i586", "product_id": "webkit-jsc-4-2.46.6-150600.12.27.1.i586" } }, { "category": "product_version", "name": "webkit-jsc-4.1-2.46.6-150600.12.27.1.i586", "product": { "name": "webkit-jsc-4.1-2.46.6-150600.12.27.1.i586", "product_id": "webkit-jsc-4.1-2.46.6-150600.12.27.1.i586" } }, { "category": "product_version", "name": "webkit-jsc-6.0-2.46.6-150600.12.27.1.i586", "product": { "name": "webkit-jsc-6.0-2.46.6-150600.12.27.1.i586", "product_id": "webkit-jsc-6.0-2.46.6-150600.12.27.1.i586" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.i586", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.i586", "product_id": "webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.i586" } }, { "category": "product_version", "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.i586", "product": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.i586", "product_id": "webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.i586" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.46.6-150600.12.27.1.i586", "product": { "name": "webkit2gtk3-devel-2.46.6-150600.12.27.1.i586", "product_id": "webkit2gtk3-devel-2.46.6-150600.12.27.1.i586" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.i586", "product": { "name": "webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.i586", "product_id": "webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.i586" } }, { "category": "product_version", "name": "webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.i586", "product": { "name": "webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.i586", "product_id": "webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.i586" } }, { "category": "product_version", "name": "webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.i586", "product": { "name": "webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.i586", "product_id": "webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.i586" } }, { "category": "product_version", "name": "webkit2gtk4-devel-2.46.6-150600.12.27.1.i586", "product": { "name": "webkit2gtk4-devel-2.46.6-150600.12.27.1.i586", "product_id": "webkit2gtk4-devel-2.46.6-150600.12.27.1.i586" } }, { "category": "product_version", "name": "webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.i586", "product": { "name": "webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.i586", "product_id": "webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.i586" } }, { "category": "product_version", "name": "webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.i586", "product": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.i586", "product_id": "webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "product": { "name": "WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "product_id": "WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch" } }, { "category": "product_version", "name": "WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "product": { "name": "WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "product_id": "WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch" } }, { "category": "product_version", "name": "WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "product": { "name": "WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "product_id": "WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "product": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "product_id": "libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le" } }, { "category": "product_version", "name": "libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "product": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "product_id": "libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le" } }, { "category": "product_version", "name": "libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "product": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "product_id": "libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "product": { "name": "libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "product_id": "libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le" } }, { "category": "product_version", "name": "libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "product": { "name": "libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "product_id": "libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le" } }, { "category": "product_version", "name": "libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "product": { "name": "libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "product_id": "libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "product": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "product_id": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "product": { "name": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "product_id": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "product": { "name": "typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "product_id": "typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "product": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "product_id": "typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "product": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "product_id": "typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "product_id": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "product": { "name": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "product_id": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le" } }, { "category": "product_version", "name": "webkit-jsc-4-2.46.6-150600.12.27.1.ppc64le", "product": { "name": "webkit-jsc-4-2.46.6-150600.12.27.1.ppc64le", "product_id": "webkit-jsc-4-2.46.6-150600.12.27.1.ppc64le" } }, { "category": "product_version", "name": "webkit-jsc-4.1-2.46.6-150600.12.27.1.ppc64le", "product": { "name": "webkit-jsc-4.1-2.46.6-150600.12.27.1.ppc64le", "product_id": "webkit-jsc-4.1-2.46.6-150600.12.27.1.ppc64le" } }, { "category": "product_version", "name": "webkit-jsc-6.0-2.46.6-150600.12.27.1.ppc64le", "product": { "name": "webkit-jsc-6.0-2.46.6-150600.12.27.1.ppc64le", "product_id": "webkit-jsc-6.0-2.46.6-150600.12.27.1.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "product_id": "webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "product": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "product_id": "webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "product": { "name": "webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "product_id": "webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.ppc64le", "product": { "name": "webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.ppc64le", "product_id": "webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "product": { "name": "webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "product_id": "webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.ppc64le", "product": { "name": "webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.ppc64le", "product_id": "webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "product": { "name": "webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "product_id": "webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.ppc64le", "product": { "name": "webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.ppc64le", "product_id": "webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.ppc64le" } }, { "category": "product_version", "name": "webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "product": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "product_id": "webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "product": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "product_id": "libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x" } }, { "category": "product_version", "name": "libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "product": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "product_id": "libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x" } }, { "category": "product_version", "name": "libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "product": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "product_id": "libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "product": { "name": "libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "product_id": "libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x" } }, { "category": "product_version", "name": "libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "product": { "name": "libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "product_id": "libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x" } }, { "category": "product_version", "name": "libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "product": { "name": "libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "product_id": "libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "product": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "product_id": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "product": { "name": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "product_id": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x" } }, { "category": "product_version", "name": "typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "product": { "name": "typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "product_id": "typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "product": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "product_id": "typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "product": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "product_id": "typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "product_id": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x" } }, { "category": "product_version", "name": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "product": { "name": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "product_id": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x" } }, { "category": "product_version", "name": "webkit-jsc-4-2.46.6-150600.12.27.1.s390x", "product": { "name": "webkit-jsc-4-2.46.6-150600.12.27.1.s390x", "product_id": "webkit-jsc-4-2.46.6-150600.12.27.1.s390x" } }, { "category": "product_version", "name": "webkit-jsc-4.1-2.46.6-150600.12.27.1.s390x", "product": { "name": "webkit-jsc-4.1-2.46.6-150600.12.27.1.s390x", "product_id": "webkit-jsc-4.1-2.46.6-150600.12.27.1.s390x" } }, { "category": "product_version", "name": "webkit-jsc-6.0-2.46.6-150600.12.27.1.s390x", "product": { "name": "webkit-jsc-6.0-2.46.6-150600.12.27.1.s390x", "product_id": "webkit-jsc-6.0-2.46.6-150600.12.27.1.s390x" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "product_id": "webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x" } }, { "category": "product_version", "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "product": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "product_id": "webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "product": { "name": "webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "product_id": "webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.s390x", "product": { "name": "webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.s390x", "product_id": "webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.s390x" } }, { "category": "product_version", "name": "webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "product": { "name": "webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "product_id": "webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x" } }, { "category": "product_version", "name": "webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.s390x", "product": { "name": "webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.s390x", "product_id": "webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.s390x" } }, { "category": "product_version", "name": "webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "product": { "name": "webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "product_id": "webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x" } }, { "category": "product_version", "name": "webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.s390x", "product": { "name": "webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.s390x", "product_id": "webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.s390x" } }, { "category": "product_version", "name": "webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "product": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "product_id": "webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "product": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "product_id": "libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64" } }, { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-32bit-2.46.6-150600.12.27.1.x86_64", "product": { "name": "libjavascriptcoregtk-4_0-18-32bit-2.46.6-150600.12.27.1.x86_64", "product_id": "libjavascriptcoregtk-4_0-18-32bit-2.46.6-150600.12.27.1.x86_64" } }, { "category": "product_version", "name": "libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "product": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "product_id": "libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64" } }, { "category": "product_version", "name": "libjavascriptcoregtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "product": { "name": "libjavascriptcoregtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "product_id": "libjavascriptcoregtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64" } }, { "category": "product_version", "name": "libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "product": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "product_id": "libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "product": { "name": "libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "product_id": "libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-32bit-2.46.6-150600.12.27.1.x86_64", "product": { "name": "libwebkit2gtk-4_0-37-32bit-2.46.6-150600.12.27.1.x86_64", "product_id": "libwebkit2gtk-4_0-37-32bit-2.46.6-150600.12.27.1.x86_64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "product": { "name": "libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "product_id": "libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "product": { "name": "libwebkit2gtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "product_id": "libwebkit2gtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64" } }, { "category": "product_version", "name": "libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "product": { "name": "libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "product_id": "libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "product": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "product_id": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "product": { "name": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "product_id": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "product": { "name": "typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "product_id": "typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "product": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "product_id": "typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "product": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "product_id": "typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "product_id": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "product": { "name": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "product_id": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64" } }, { "category": "product_version", "name": "webkit-jsc-4-2.46.6-150600.12.27.1.x86_64", "product": { "name": "webkit-jsc-4-2.46.6-150600.12.27.1.x86_64", "product_id": "webkit-jsc-4-2.46.6-150600.12.27.1.x86_64" } }, { "category": "product_version", "name": "webkit-jsc-4.1-2.46.6-150600.12.27.1.x86_64", "product": { "name": "webkit-jsc-4.1-2.46.6-150600.12.27.1.x86_64", "product_id": "webkit-jsc-4.1-2.46.6-150600.12.27.1.x86_64" } }, { "category": "product_version", "name": "webkit-jsc-6.0-2.46.6-150600.12.27.1.x86_64", "product": { "name": "webkit-jsc-6.0-2.46.6-150600.12.27.1.x86_64", "product_id": "webkit-jsc-6.0-2.46.6-150600.12.27.1.x86_64" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "product_id": "webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64" } }, { "category": "product_version", "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "product": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "product_id": "webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "product": { "name": "webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "product_id": "webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.x86_64", "product": { "name": "webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.x86_64", "product_id": "webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.x86_64" } }, { "category": "product_version", "name": "webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "product": { "name": "webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "product_id": "webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64" } }, { "category": "product_version", "name": "webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.x86_64", "product": { "name": "webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.x86_64", "product_id": "webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.x86_64" } }, { "category": "product_version", "name": "webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "product": { "name": "webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "product_id": "webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64" } }, { "category": "product_version", "name": "webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.x86_64", "product": { "name": "webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.x86_64", "product_id": "webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.x86_64" } }, { "category": "product_version", "name": "webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "product": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "product_id": "webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-desktop-applications:15:sp6" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp6" } } }, { "category": "product_name", "name": "openSUSE Leap 15.6", "product": { "name": "openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.6" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch" }, "product_reference": "WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch" }, "product_reference": "WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x" }, "product_reference": "libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x" }, "product_reference": "libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x" }, "product_reference": "webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x" }, "product_reference": "webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch" }, "product_reference": "WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x" }, "product_reference": "libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x" }, "product_reference": "libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x" }, "product_reference": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x" }, "product_reference": "typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x" }, "product_reference": "webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x" }, "product_reference": "webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64 as component of SUSE Linux Enterprise Module for Desktop Applications 15 SP6", "product_id": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Desktop Applications 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x" }, "product_reference": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x" }, "product_reference": "typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x" }, "product_reference": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x" }, "product_reference": "webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6", "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch" }, "product_reference": "WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch" }, "product_reference": "WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch" }, "product_reference": "WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-32bit-2.46.6-150600.12.27.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-32bit-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-32bit-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x" }, "product_reference": "libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "libjavascriptcoregtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x" }, "product_reference": "libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-32bit-2.46.6-150600.12.27.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-32bit-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-32bit-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x" }, "product_reference": "libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "libwebkit2gtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x" }, "product_reference": "libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x" }, "product_reference": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x" }, "product_reference": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x" }, "product_reference": "typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x" }, "product_reference": "typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x" }, "product_reference": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit-jsc-4-2.46.6-150600.12.27.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "webkit-jsc-4-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit-jsc-4-2.46.6-150600.12.27.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "webkit-jsc-4-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit-jsc-4-2.46.6-150600.12.27.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.s390x" }, "product_reference": "webkit-jsc-4-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit-jsc-4-2.46.6-150600.12.27.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "webkit-jsc-4-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit-jsc-4.1-2.46.6-150600.12.27.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "webkit-jsc-4.1-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit-jsc-4.1-2.46.6-150600.12.27.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "webkit-jsc-4.1-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit-jsc-4.1-2.46.6-150600.12.27.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.s390x" }, "product_reference": "webkit-jsc-4.1-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit-jsc-4.1-2.46.6-150600.12.27.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "webkit-jsc-4.1-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit-jsc-6.0-2.46.6-150600.12.27.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "webkit-jsc-6.0-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit-jsc-6.0-2.46.6-150600.12.27.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "webkit-jsc-6.0-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit-jsc-6.0-2.46.6-150600.12.27.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.s390x" }, "product_reference": "webkit-jsc-6.0-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit-jsc-6.0-2.46.6-150600.12.27.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "webkit-jsc-6.0-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x" }, "product_reference": "webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x" }, "product_reference": "webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.s390x" }, "product_reference": "webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x" }, "product_reference": "webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.s390x" }, "product_reference": "webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x" }, "product_reference": "webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.s390x" }, "product_reference": "webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64" }, "product_reference": "webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le" }, "product_reference": "webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x" }, "product_reference": "webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "relates_to_product_reference": "openSUSE Leap 15.6" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64 as component of openSUSE Leap 15.6", "product_id": "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64" }, "product_reference": "webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-27856", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-27856" } ], "notes": [ { "category": "general", "text": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.5, iOS 16.7.8 and iPadOS 16.7.8, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, tvOS 17.5, visionOS 1.2. Processing a file may lead to unexpected app termination or arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-27856", "url": "https://www.suse.com/security/cve/CVE-2024-27856" }, { "category": "external", "summary": "SUSE Bug 1236946 for CVE-2024-27856", "url": "https://bugzilla.suse.com/1236946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-24T13:12:26Z", "details": "important" } ], "title": "CVE-2024-27856" }, { "cve": "CVE-2024-54543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-54543" } ], "notes": [ { "category": "general", "text": "The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.2, tvOS 18.2, Safari 18.2, watchOS 11.2, iOS 18.2 and iPadOS 18.2, macOS Sequoia 15.2. Processing maliciously crafted web content may lead to memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-54543", "url": "https://www.suse.com/security/cve/CVE-2024-54543" }, { "category": "external", "summary": "SUSE Bug 1236946 for CVE-2024-54543", "url": "https://bugzilla.suse.com/1236946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-24T13:12:26Z", "details": "important" } ], "title": "CVE-2024-54543" }, { "cve": "CVE-2024-54658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-54658" } ], "notes": [ { "category": "general", "text": "The issue was addressed with improved memory handling. This issue is fixed in iOS 17.4 and iPadOS 17.4, Safari 17.4, tvOS 17.4, watchOS 10.4, visionOS 1.1, macOS Sonoma 14.4. Processing web content may lead to a denial-of-service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-54658", "url": "https://www.suse.com/security/cve/CVE-2024-54658" }, { "category": "external", "summary": "SUSE Bug 1236946 for CVE-2024-54658", "url": "https://bugzilla.suse.com/1236946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-24T13:12:26Z", "details": "important" } ], "title": "CVE-2024-54658" }, { "cve": "CVE-2025-24143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24143" } ], "notes": [ { "category": "general", "text": "The issue was addressed with improved access restrictions to the file system. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, visionOS 2.3. A maliciously crafted webpage may be able to fingerprint the user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24143", "url": "https://www.suse.com/security/cve/CVE-2025-24143" }, { "category": "external", "summary": "SUSE Bug 1236946 for CVE-2025-24143", "url": "https://bugzilla.suse.com/1236946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-24T13:12:26Z", "details": "important" } ], "title": "CVE-2025-24143" }, { "cve": "CVE-2025-24150", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24150" } ], "notes": [ { "category": "general", "text": "A privacy issue was addressed with improved handling of files. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3. Copying a URL from Web Inspector may lead to command injection.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24150", "url": "https://www.suse.com/security/cve/CVE-2025-24150" }, { "category": "external", "summary": "SUSE Bug 1236946 for CVE-2025-24150", "url": "https://bugzilla.suse.com/1236946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-24T13:12:26Z", "details": "important" } ], "title": "CVE-2025-24150" }, { "cve": "CVE-2025-24158", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24158" } ], "notes": [ { "category": "general", "text": "The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Processing web content may lead to a denial-of-service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24158", "url": "https://www.suse.com/security/cve/CVE-2025-24158" }, { "category": "external", "summary": "SUSE Bug 1236946 for CVE-2025-24158", "url": "https://bugzilla.suse.com/1236946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-24T13:12:26Z", "details": "important" } ], "title": "CVE-2025-24158" }, { "cve": "CVE-2025-24162", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24162" } ], "notes": [ { "category": "general", "text": "This issue was addressed through improved state management. This issue is fixed in visionOS 2.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Processing maliciously crafted web content may lead to an unexpected process crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24162", "url": "https://www.suse.com/security/cve/CVE-2025-24162" }, { "category": "external", "summary": "SUSE Bug 1236946 for CVE-2025-24162", "url": "https://bugzilla.suse.com/1236946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Desktop Applications 15 SP6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15 SP6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:WebKitGTK-4.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-4.1-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:WebKitGTK-6.0-lang-2.46.6-150600.12.27.1.noarch", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_0-18-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libjavascriptcoregtk-6_0-1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_0-37-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkit2gtk-4_1-0-32bit-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:libwebkitgtk-6_0-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-JavaScriptCore-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-4.1-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit-jsc-6.0-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_0-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk-4_1-injected-bundles-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk3-soup2-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-devel-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkit2gtk4-minibrowser-2.46.6-150600.12.27.1.x86_64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.aarch64", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.ppc64le", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.s390x", "openSUSE Leap 15.6:webkitgtk-6_0-injected-bundles-2.46.6-150600.12.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-24T13:12:26Z", "details": "important" } ], "title": "CVE-2025-24162" } ] }
suse-su-2025:0638-1
Vulnerability from csaf_suse
Published
2025-02-21 15:38
Modified
2025-02-21 15:38
Summary
Security update for webkit2gtk3
Notes
Title of the patch
Security update for webkit2gtk3
Description of the patch
This update for webkit2gtk3 fixes the following issues:
Update to version 2.46.6 (bsc#1236946):
- CVE-2025-24143: A maliciously crafted webpage may be able to fingerprint the user.
- CVE-2025-24150: Copying a URL from Web Inspector may lead to command injection.
- CVE-2025-24158: Processing web content may lead to a denial-of-service.
- CVE-2025-24162: Processing maliciously crafted web content may lead to an unexpected process crash.
Already fixed in previous releases:
- CVE-2024-54543: Processing maliciously crafted web content may lead to memory corruption.
- CVE-2024-27856: Processing a file may lead to unexpected app termination or arbitrary code execution.
- CVE-2024-54658: Processing web content may lead to a denial-of-service.
Patchnames
SUSE-2025-638,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-638,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-638,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-638,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-638,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-638,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-638,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-638,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-638,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-638,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-638
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for webkit2gtk3", "title": "Title of the patch" }, { "category": "description", "text": "This update for webkit2gtk3 fixes the following issues:\n\nUpdate to version 2.46.6 (bsc#1236946):\n\n- CVE-2025-24143: A maliciously crafted webpage may be able to fingerprint the user.\n- CVE-2025-24150: Copying a URL from Web Inspector may lead to command injection.\n- CVE-2025-24158: Processing web content may lead to a denial-of-service.\n- CVE-2025-24162: Processing maliciously crafted web content may lead to an unexpected process crash.\n\nAlready fixed in previous releases:\n\n- CVE-2024-54543: Processing maliciously crafted web content may lead to memory corruption.\n- CVE-2024-27856: Processing a file may lead to unexpected app termination or arbitrary code execution.\n- CVE-2024-54658: Processing web content may lead to a denial-of-service.\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-638,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-638,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-638,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-638,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-638,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-638,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-638,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-638,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-638,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-638,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-638", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_0638-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:0638-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250638-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:0638-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020399.html" }, { "category": "self", "summary": "SUSE Bug 1236946", "url": "https://bugzilla.suse.com/1236946" }, { "category": "self", "summary": "SUSE CVE CVE-2024-27856 page", "url": "https://www.suse.com/security/cve/CVE-2024-27856/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-54543 page", "url": "https://www.suse.com/security/cve/CVE-2024-54543/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-54658 page", "url": "https://www.suse.com/security/cve/CVE-2024-54658/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24143 page", "url": "https://www.suse.com/security/cve/CVE-2025-24143/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24150 page", "url": "https://www.suse.com/security/cve/CVE-2025-24150/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24158 page", "url": "https://www.suse.com/security/cve/CVE-2025-24158/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24162 page", "url": "https://www.suse.com/security/cve/CVE-2025-24162/" } ], "title": "Security update for webkit2gtk3", "tracking": { "current_release_date": "2025-02-21T15:38:46Z", "generator": { "date": "2025-02-21T15:38:46Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:0638-1", "initial_release_date": "2025-02-21T15:38:46Z", "revision_history": [ { "date": "2025-02-21T15:38:46Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "product": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "product_id": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64" } }, { "category": "product_version", "name": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "product": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "product_id": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64" } }, { "category": "product_version", "name": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "product": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "product_id": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "product": { "name": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "product_id": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "product": { "name": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "product_id": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64" } }, { "category": "product_version", "name": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "product": { "name": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "product_id": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "product": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "product_id": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150400.4.106.1.aarch64", "product": { "name": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150400.4.106.1.aarch64", "product_id": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150400.4.106.1.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit-6_0-2.46.6-150400.4.106.1.aarch64", "product": { "name": "typelib-1_0-WebKit-6_0-2.46.6-150400.4.106.1.aarch64", "product_id": "typelib-1_0-WebKit-6_0-2.46.6-150400.4.106.1.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "product": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "product_id": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "product": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "product_id": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "product_id": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150400.4.106.1.aarch64", "product": { "name": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150400.4.106.1.aarch64", "product_id": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150400.4.106.1.aarch64" } }, { "category": "product_version", "name": "webkit-jsc-4-2.46.6-150400.4.106.1.aarch64", "product": { "name": "webkit-jsc-4-2.46.6-150400.4.106.1.aarch64", "product_id": "webkit-jsc-4-2.46.6-150400.4.106.1.aarch64" } }, { "category": "product_version", "name": "webkit-jsc-4.1-2.46.6-150400.4.106.1.aarch64", "product": { "name": "webkit-jsc-4.1-2.46.6-150400.4.106.1.aarch64", "product_id": "webkit-jsc-4.1-2.46.6-150400.4.106.1.aarch64" } }, { "category": "product_version", "name": "webkit-jsc-6.0-2.46.6-150400.4.106.1.aarch64", "product": { "name": "webkit-jsc-6.0-2.46.6-150400.4.106.1.aarch64", "product_id": "webkit-jsc-6.0-2.46.6-150400.4.106.1.aarch64" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "product_id": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64" } }, { "category": "product_version", "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "product": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "product_id": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "product": { "name": "webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "product_id": "webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.46.6-150400.4.106.1.aarch64", "product": { "name": "webkit2gtk3-minibrowser-2.46.6-150400.4.106.1.aarch64", "product_id": "webkit2gtk3-minibrowser-2.46.6-150400.4.106.1.aarch64" } }, { "category": "product_version", "name": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "product": { "name": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "product_id": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64" } }, { "category": "product_version", "name": "webkit2gtk3-soup2-minibrowser-2.46.6-150400.4.106.1.aarch64", "product": { "name": "webkit2gtk3-soup2-minibrowser-2.46.6-150400.4.106.1.aarch64", "product_id": "webkit2gtk3-soup2-minibrowser-2.46.6-150400.4.106.1.aarch64" } }, { "category": "product_version", "name": "webkit2gtk4-devel-2.46.6-150400.4.106.1.aarch64", "product": { "name": "webkit2gtk4-devel-2.46.6-150400.4.106.1.aarch64", "product_id": "webkit2gtk4-devel-2.46.6-150400.4.106.1.aarch64" } }, { "category": "product_version", "name": "webkit2gtk4-minibrowser-2.46.6-150400.4.106.1.aarch64", "product": { "name": "webkit2gtk4-minibrowser-2.46.6-150400.4.106.1.aarch64", "product_id": "webkit2gtk4-minibrowser-2.46.6-150400.4.106.1.aarch64" } }, { "category": "product_version", "name": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "product": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "product_id": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-64bit-2.46.6-150400.4.106.1.aarch64_ilp32", "product": { "name": "libjavascriptcoregtk-4_0-18-64bit-2.46.6-150400.4.106.1.aarch64_ilp32", "product_id": "libjavascriptcoregtk-4_0-18-64bit-2.46.6-150400.4.106.1.aarch64_ilp32" } }, { "category": "product_version", "name": "libjavascriptcoregtk-4_1-0-64bit-2.46.6-150400.4.106.1.aarch64_ilp32", "product": { "name": "libjavascriptcoregtk-4_1-0-64bit-2.46.6-150400.4.106.1.aarch64_ilp32", "product_id": "libjavascriptcoregtk-4_1-0-64bit-2.46.6-150400.4.106.1.aarch64_ilp32" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-64bit-2.46.6-150400.4.106.1.aarch64_ilp32", "product": { "name": "libwebkit2gtk-4_0-37-64bit-2.46.6-150400.4.106.1.aarch64_ilp32", "product_id": "libwebkit2gtk-4_0-37-64bit-2.46.6-150400.4.106.1.aarch64_ilp32" } }, { "category": "product_version", "name": "libwebkit2gtk-4_1-0-64bit-2.46.6-150400.4.106.1.aarch64_ilp32", "product": { "name": "libwebkit2gtk-4_1-0-64bit-2.46.6-150400.4.106.1.aarch64_ilp32", "product_id": "libwebkit2gtk-4_1-0-64bit-2.46.6-150400.4.106.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.i586", "product": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.i586", "product_id": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.i586" } }, { "category": "product_version", "name": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.i586", "product": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.i586", "product_id": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.i586" } }, { "category": "product_version", "name": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.i586", "product": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.i586", "product_id": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.i586" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.i586", "product": { "name": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.i586", "product_id": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.i586" } }, { "category": "product_version", "name": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.i586", "product": { "name": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.i586", "product_id": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.i586" } }, { "category": "product_version", "name": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.i586", "product": { "name": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.i586", "product_id": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.i586" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.i586", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.i586", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.i586" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.i586", "product": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.i586", "product_id": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.i586" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150400.4.106.1.i586", "product": { "name": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150400.4.106.1.i586", "product_id": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150400.4.106.1.i586" } }, { "category": "product_version", "name": "typelib-1_0-WebKit-6_0-2.46.6-150400.4.106.1.i586", "product": { "name": "typelib-1_0-WebKit-6_0-2.46.6-150400.4.106.1.i586", "product_id": "typelib-1_0-WebKit-6_0-2.46.6-150400.4.106.1.i586" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.i586", "product": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.i586", "product_id": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.i586" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.i586", "product": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.i586", "product_id": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.i586" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.i586", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.i586", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.i586" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.i586", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.i586", "product_id": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.i586" } }, { "category": "product_version", "name": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150400.4.106.1.i586", "product": { "name": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150400.4.106.1.i586", "product_id": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150400.4.106.1.i586" } }, { "category": "product_version", "name": "webkit-jsc-4-2.46.6-150400.4.106.1.i586", "product": { "name": "webkit-jsc-4-2.46.6-150400.4.106.1.i586", "product_id": "webkit-jsc-4-2.46.6-150400.4.106.1.i586" } }, { "category": "product_version", "name": "webkit-jsc-4.1-2.46.6-150400.4.106.1.i586", "product": { "name": "webkit-jsc-4.1-2.46.6-150400.4.106.1.i586", "product_id": "webkit-jsc-4.1-2.46.6-150400.4.106.1.i586" } }, { "category": "product_version", "name": "webkit-jsc-6.0-2.46.6-150400.4.106.1.i586", "product": { "name": "webkit-jsc-6.0-2.46.6-150400.4.106.1.i586", "product_id": "webkit-jsc-6.0-2.46.6-150400.4.106.1.i586" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.i586", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.i586", "product_id": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.i586" } }, { "category": "product_version", "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.i586", "product": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.i586", "product_id": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.i586" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.46.6-150400.4.106.1.i586", "product": { "name": "webkit2gtk3-devel-2.46.6-150400.4.106.1.i586", "product_id": "webkit2gtk3-devel-2.46.6-150400.4.106.1.i586" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.46.6-150400.4.106.1.i586", "product": { "name": "webkit2gtk3-minibrowser-2.46.6-150400.4.106.1.i586", "product_id": "webkit2gtk3-minibrowser-2.46.6-150400.4.106.1.i586" } }, { "category": "product_version", "name": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.i586", "product": { "name": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.i586", "product_id": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.i586" } }, { "category": "product_version", "name": "webkit2gtk3-soup2-minibrowser-2.46.6-150400.4.106.1.i586", "product": { "name": "webkit2gtk3-soup2-minibrowser-2.46.6-150400.4.106.1.i586", "product_id": "webkit2gtk3-soup2-minibrowser-2.46.6-150400.4.106.1.i586" } }, { "category": "product_version", "name": "webkit2gtk4-devel-2.46.6-150400.4.106.1.i586", "product": { "name": "webkit2gtk4-devel-2.46.6-150400.4.106.1.i586", "product_id": "webkit2gtk4-devel-2.46.6-150400.4.106.1.i586" } }, { "category": "product_version", "name": "webkit2gtk4-minibrowser-2.46.6-150400.4.106.1.i586", "product": { "name": "webkit2gtk4-minibrowser-2.46.6-150400.4.106.1.i586", "product_id": "webkit2gtk4-minibrowser-2.46.6-150400.4.106.1.i586" } }, { "category": "product_version", "name": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.i586", "product": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.i586", "product_id": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "product": { "name": "WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "product_id": "WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch" } }, { "category": "product_version", "name": "WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "product": { "name": "WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "product_id": "WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch" } }, { "category": "product_version", "name": "WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "product": { "name": "WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "product_id": "WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "product": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "product_id": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le" } }, { "category": "product_version", "name": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "product": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "product_id": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le" } }, { "category": "product_version", "name": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "product": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "product_id": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "product": { "name": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "product_id": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le" } }, { "category": "product_version", "name": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "product": { "name": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "product_id": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le" } }, { "category": "product_version", "name": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "product": { "name": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "product_id": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "product": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "product_id": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150400.4.106.1.ppc64le", "product": { "name": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150400.4.106.1.ppc64le", "product_id": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150400.4.106.1.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-WebKit-6_0-2.46.6-150400.4.106.1.ppc64le", "product": { "name": "typelib-1_0-WebKit-6_0-2.46.6-150400.4.106.1.ppc64le", "product_id": "typelib-1_0-WebKit-6_0-2.46.6-150400.4.106.1.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "product": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "product_id": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "product": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "product_id": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "product_id": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150400.4.106.1.ppc64le", "product": { "name": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150400.4.106.1.ppc64le", "product_id": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150400.4.106.1.ppc64le" } }, { "category": "product_version", "name": "webkit-jsc-4-2.46.6-150400.4.106.1.ppc64le", "product": { "name": "webkit-jsc-4-2.46.6-150400.4.106.1.ppc64le", "product_id": "webkit-jsc-4-2.46.6-150400.4.106.1.ppc64le" } }, { "category": "product_version", "name": "webkit-jsc-4.1-2.46.6-150400.4.106.1.ppc64le", "product": { "name": "webkit-jsc-4.1-2.46.6-150400.4.106.1.ppc64le", "product_id": "webkit-jsc-4.1-2.46.6-150400.4.106.1.ppc64le" } }, { "category": "product_version", "name": "webkit-jsc-6.0-2.46.6-150400.4.106.1.ppc64le", "product": { "name": "webkit-jsc-6.0-2.46.6-150400.4.106.1.ppc64le", "product_id": "webkit-jsc-6.0-2.46.6-150400.4.106.1.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "product_id": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "product": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "product_id": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "product": { "name": "webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "product_id": "webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.46.6-150400.4.106.1.ppc64le", "product": { "name": "webkit2gtk3-minibrowser-2.46.6-150400.4.106.1.ppc64le", "product_id": "webkit2gtk3-minibrowser-2.46.6-150400.4.106.1.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "product": { "name": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "product_id": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk3-soup2-minibrowser-2.46.6-150400.4.106.1.ppc64le", "product": { "name": "webkit2gtk3-soup2-minibrowser-2.46.6-150400.4.106.1.ppc64le", "product_id": "webkit2gtk3-soup2-minibrowser-2.46.6-150400.4.106.1.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk4-devel-2.46.6-150400.4.106.1.ppc64le", "product": { "name": "webkit2gtk4-devel-2.46.6-150400.4.106.1.ppc64le", "product_id": "webkit2gtk4-devel-2.46.6-150400.4.106.1.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk4-minibrowser-2.46.6-150400.4.106.1.ppc64le", "product": { "name": "webkit2gtk4-minibrowser-2.46.6-150400.4.106.1.ppc64le", "product_id": "webkit2gtk4-minibrowser-2.46.6-150400.4.106.1.ppc64le" } }, { "category": "product_version", "name": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "product": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "product_id": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "product": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "product_id": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x" } }, { "category": "product_version", "name": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "product": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "product_id": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x" } }, { "category": "product_version", "name": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "product": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "product_id": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "product": { "name": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "product_id": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x" } }, { "category": "product_version", "name": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "product": { "name": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "product_id": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x" } }, { "category": "product_version", "name": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "product": { "name": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "product_id": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "product": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "product_id": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150400.4.106.1.s390x", "product": { "name": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150400.4.106.1.s390x", "product_id": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150400.4.106.1.s390x" } }, { "category": "product_version", "name": "typelib-1_0-WebKit-6_0-2.46.6-150400.4.106.1.s390x", "product": { "name": "typelib-1_0-WebKit-6_0-2.46.6-150400.4.106.1.s390x", "product_id": "typelib-1_0-WebKit-6_0-2.46.6-150400.4.106.1.s390x" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "product": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "product_id": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "product": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "product_id": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "product_id": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x" } }, { "category": "product_version", "name": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150400.4.106.1.s390x", "product": { "name": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150400.4.106.1.s390x", "product_id": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150400.4.106.1.s390x" } }, { "category": "product_version", "name": "webkit-jsc-4-2.46.6-150400.4.106.1.s390x", "product": { "name": "webkit-jsc-4-2.46.6-150400.4.106.1.s390x", "product_id": "webkit-jsc-4-2.46.6-150400.4.106.1.s390x" } }, { "category": "product_version", "name": "webkit-jsc-4.1-2.46.6-150400.4.106.1.s390x", "product": { "name": "webkit-jsc-4.1-2.46.6-150400.4.106.1.s390x", "product_id": "webkit-jsc-4.1-2.46.6-150400.4.106.1.s390x" } }, { "category": "product_version", "name": "webkit-jsc-6.0-2.46.6-150400.4.106.1.s390x", "product": { "name": "webkit-jsc-6.0-2.46.6-150400.4.106.1.s390x", "product_id": "webkit-jsc-6.0-2.46.6-150400.4.106.1.s390x" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "product_id": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x" } }, { "category": "product_version", "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "product": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "product_id": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "product": { "name": "webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "product_id": "webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.46.6-150400.4.106.1.s390x", "product": { "name": "webkit2gtk3-minibrowser-2.46.6-150400.4.106.1.s390x", "product_id": "webkit2gtk3-minibrowser-2.46.6-150400.4.106.1.s390x" } }, { "category": "product_version", "name": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "product": { "name": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "product_id": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x" } }, { "category": "product_version", "name": "webkit2gtk3-soup2-minibrowser-2.46.6-150400.4.106.1.s390x", "product": { "name": "webkit2gtk3-soup2-minibrowser-2.46.6-150400.4.106.1.s390x", "product_id": "webkit2gtk3-soup2-minibrowser-2.46.6-150400.4.106.1.s390x" } }, { "category": "product_version", "name": "webkit2gtk4-devel-2.46.6-150400.4.106.1.s390x", "product": { "name": "webkit2gtk4-devel-2.46.6-150400.4.106.1.s390x", "product_id": "webkit2gtk4-devel-2.46.6-150400.4.106.1.s390x" } }, { "category": "product_version", "name": "webkit2gtk4-minibrowser-2.46.6-150400.4.106.1.s390x", "product": { "name": "webkit2gtk4-minibrowser-2.46.6-150400.4.106.1.s390x", "product_id": "webkit2gtk4-minibrowser-2.46.6-150400.4.106.1.s390x" } }, { "category": "product_version", "name": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "product": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "product_id": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "product": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "product_id": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64" } }, { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-32bit-2.46.6-150400.4.106.1.x86_64", "product": { "name": "libjavascriptcoregtk-4_0-18-32bit-2.46.6-150400.4.106.1.x86_64", "product_id": "libjavascriptcoregtk-4_0-18-32bit-2.46.6-150400.4.106.1.x86_64" } }, { "category": "product_version", "name": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "product": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "product_id": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64" } }, { "category": "product_version", "name": "libjavascriptcoregtk-4_1-0-32bit-2.46.6-150400.4.106.1.x86_64", "product": { "name": "libjavascriptcoregtk-4_1-0-32bit-2.46.6-150400.4.106.1.x86_64", "product_id": "libjavascriptcoregtk-4_1-0-32bit-2.46.6-150400.4.106.1.x86_64" } }, { "category": "product_version", "name": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "product": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "product_id": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "product": { "name": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "product_id": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-32bit-2.46.6-150400.4.106.1.x86_64", "product": { "name": "libwebkit2gtk-4_0-37-32bit-2.46.6-150400.4.106.1.x86_64", "product_id": "libwebkit2gtk-4_0-37-32bit-2.46.6-150400.4.106.1.x86_64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "product": { "name": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "product_id": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_1-0-32bit-2.46.6-150400.4.106.1.x86_64", "product": { "name": "libwebkit2gtk-4_1-0-32bit-2.46.6-150400.4.106.1.x86_64", "product_id": "libwebkit2gtk-4_1-0-32bit-2.46.6-150400.4.106.1.x86_64" } }, { "category": "product_version", "name": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "product": { "name": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "product_id": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "product": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "product_id": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150400.4.106.1.x86_64", "product": { "name": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150400.4.106.1.x86_64", "product_id": "typelib-1_0-JavaScriptCore-6_0-2.46.6-150400.4.106.1.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit-6_0-2.46.6-150400.4.106.1.x86_64", "product": { "name": "typelib-1_0-WebKit-6_0-2.46.6-150400.4.106.1.x86_64", "product_id": "typelib-1_0-WebKit-6_0-2.46.6-150400.4.106.1.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "product": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "product_id": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "product": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "product_id": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "product_id": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150400.4.106.1.x86_64", "product": { "name": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150400.4.106.1.x86_64", "product_id": "typelib-1_0-WebKitWebProcessExtension-6_0-2.46.6-150400.4.106.1.x86_64" } }, { "category": "product_version", "name": "webkit-jsc-4-2.46.6-150400.4.106.1.x86_64", "product": { "name": "webkit-jsc-4-2.46.6-150400.4.106.1.x86_64", "product_id": "webkit-jsc-4-2.46.6-150400.4.106.1.x86_64" } }, { "category": "product_version", "name": "webkit-jsc-4.1-2.46.6-150400.4.106.1.x86_64", "product": { "name": "webkit-jsc-4.1-2.46.6-150400.4.106.1.x86_64", "product_id": "webkit-jsc-4.1-2.46.6-150400.4.106.1.x86_64" } }, { "category": "product_version", "name": "webkit-jsc-6.0-2.46.6-150400.4.106.1.x86_64", "product": { "name": "webkit-jsc-6.0-2.46.6-150400.4.106.1.x86_64", "product_id": "webkit-jsc-6.0-2.46.6-150400.4.106.1.x86_64" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "product_id": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64" } }, { "category": "product_version", "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "product": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "product_id": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "product": { "name": "webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "product_id": "webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.46.6-150400.4.106.1.x86_64", "product": { "name": "webkit2gtk3-minibrowser-2.46.6-150400.4.106.1.x86_64", "product_id": "webkit2gtk3-minibrowser-2.46.6-150400.4.106.1.x86_64" } }, { "category": "product_version", "name": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "product": { "name": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "product_id": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64" } }, { "category": "product_version", "name": "webkit2gtk3-soup2-minibrowser-2.46.6-150400.4.106.1.x86_64", "product": { "name": "webkit2gtk3-soup2-minibrowser-2.46.6-150400.4.106.1.x86_64", "product_id": "webkit2gtk3-soup2-minibrowser-2.46.6-150400.4.106.1.x86_64" } }, { "category": "product_version", "name": "webkit2gtk4-devel-2.46.6-150400.4.106.1.x86_64", "product": { "name": "webkit2gtk4-devel-2.46.6-150400.4.106.1.x86_64", "product_id": "webkit2gtk4-devel-2.46.6-150400.4.106.1.x86_64" } }, { "category": "product_version", "name": "webkit2gtk4-minibrowser-2.46.6-150400.4.106.1.x86_64", "product": { "name": "webkit2gtk4-minibrowser-2.46.6-150400.4.106.1.x86_64", "product_id": "webkit2gtk4-minibrowser-2.46.6-150400.4.106.1.x86_64" } }, { "category": "product_version", "name": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "product": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "product_id": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp5" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 4.3", "product": { "name": "SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:4.3" } } }, { "category": "product_name", "name": "SUSE Manager Server 4.3", "product": { "name": "SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:4.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch" }, "product_reference": "WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch" }, "product_reference": "WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch" }, "product_reference": "WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch" }, "product_reference": "WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch" }, "product_reference": "WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch" }, "product_reference": "WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch" }, "product_reference": "WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch" }, "product_reference": "WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch" }, "product_reference": "WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS" }, { "category": "default_component_of", "full_product_name": { "name": "WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch" }, "product_reference": "WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch" }, "product_reference": "WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch" }, "product_reference": "WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch" }, "product_reference": "WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch" }, "product_reference": "WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch" }, "product_reference": "WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x" }, "product_reference": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x" }, "product_reference": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x" }, "product_reference": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x" }, "product_reference": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x" }, "product_reference": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x" }, "product_reference": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x" }, "product_reference": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x" }, "product_reference": "webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x" }, "product_reference": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x" }, "product_reference": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch" }, "product_reference": "WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch" }, "product_reference": "WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch" }, "product_reference": "WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x" }, "product_reference": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x" }, "product_reference": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x" }, "product_reference": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x" }, "product_reference": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x" }, "product_reference": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x" }, "product_reference": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x" }, "product_reference": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x" }, "product_reference": "webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x" }, "product_reference": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64" }, "product_reference": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x" }, "product_reference": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch" }, "product_reference": "WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch" }, "product_reference": "WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch" }, "product_reference": "WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch" }, "product_reference": "WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch" }, "product_reference": "WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch" }, "product_reference": "WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch" }, "product_reference": "WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64 as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64 as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64 as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64 as component of SUSE Manager Proxy 4.3", "product_id": "SUSE Manager Proxy 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch" }, "product_reference": "WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64 as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64 as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64 as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64 as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le" }, "product_reference": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x" }, "product_reference": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "relates_to_product_reference": "SUSE Manager Server 4.3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64 as component of SUSE Manager Server 4.3", "product_id": "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64" }, "product_reference": "webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "relates_to_product_reference": "SUSE Manager Server 4.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-27856", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-27856" } ], "notes": [ { "category": "general", "text": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.5, iOS 16.7.8 and iPadOS 16.7.8, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, tvOS 17.5, visionOS 1.2. Processing a file may lead to unexpected app termination or arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Proxy 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-27856", "url": "https://www.suse.com/security/cve/CVE-2024-27856" }, { "category": "external", "summary": "SUSE Bug 1236946 for CVE-2024-27856", "url": "https://bugzilla.suse.com/1236946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Proxy 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Proxy 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-21T15:38:46Z", "details": "important" } ], "title": "CVE-2024-27856" }, { "cve": "CVE-2024-54543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-54543" } ], "notes": [ { "category": "general", "text": "The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.2, tvOS 18.2, Safari 18.2, watchOS 11.2, iOS 18.2 and iPadOS 18.2, macOS Sequoia 15.2. Processing maliciously crafted web content may lead to memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Proxy 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-54543", "url": "https://www.suse.com/security/cve/CVE-2024-54543" }, { "category": "external", "summary": "SUSE Bug 1236946 for CVE-2024-54543", "url": "https://bugzilla.suse.com/1236946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Proxy 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Proxy 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-21T15:38:46Z", "details": "important" } ], "title": "CVE-2024-54543" }, { "cve": "CVE-2024-54658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-54658" } ], "notes": [ { "category": "general", "text": "The issue was addressed with improved memory handling. This issue is fixed in iOS 17.4 and iPadOS 17.4, Safari 17.4, tvOS 17.4, watchOS 10.4, visionOS 1.1, macOS Sonoma 14.4. Processing web content may lead to a denial-of-service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Proxy 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-54658", "url": "https://www.suse.com/security/cve/CVE-2024-54658" }, { "category": "external", "summary": "SUSE Bug 1236946 for CVE-2024-54658", "url": "https://bugzilla.suse.com/1236946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Proxy 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Proxy 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-21T15:38:46Z", "details": "important" } ], "title": "CVE-2024-54658" }, { "cve": "CVE-2025-24143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24143" } ], "notes": [ { "category": "general", "text": "The issue was addressed with improved access restrictions to the file system. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, visionOS 2.3. A maliciously crafted webpage may be able to fingerprint the user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Proxy 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24143", "url": "https://www.suse.com/security/cve/CVE-2025-24143" }, { "category": "external", "summary": "SUSE Bug 1236946 for CVE-2025-24143", "url": "https://bugzilla.suse.com/1236946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Proxy 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Proxy 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-21T15:38:46Z", "details": "important" } ], "title": "CVE-2025-24143" }, { "cve": "CVE-2025-24150", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24150" } ], "notes": [ { "category": "general", "text": "A privacy issue was addressed with improved handling of files. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3. Copying a URL from Web Inspector may lead to command injection.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Proxy 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24150", "url": "https://www.suse.com/security/cve/CVE-2025-24150" }, { "category": "external", "summary": "SUSE Bug 1236946 for CVE-2025-24150", "url": "https://bugzilla.suse.com/1236946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Proxy 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Proxy 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-21T15:38:46Z", "details": "important" } ], "title": "CVE-2025-24150" }, { "cve": "CVE-2025-24158", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24158" } ], "notes": [ { "category": "general", "text": "The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Processing web content may lead to a denial-of-service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Proxy 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24158", "url": "https://www.suse.com/security/cve/CVE-2025-24158" }, { "category": "external", "summary": "SUSE Bug 1236946 for CVE-2025-24158", "url": "https://bugzilla.suse.com/1236946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Proxy 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Proxy 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-21T15:38:46Z", "details": "important" } ], "title": "CVE-2025-24158" }, { "cve": "CVE-2025-24162", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24162" } ], "notes": [ { "category": "general", "text": "This issue was addressed through improved state management. This issue is fixed in visionOS 2.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Processing maliciously crafted web content may lead to an unexpected process crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Proxy 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24162", "url": "https://www.suse.com/security/cve/CVE-2025-24162" }, { "category": "external", "summary": "SUSE Bug 1236946 for CVE-2025-24162", "url": "https://bugzilla.suse.com/1236946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Proxy 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP4-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.aarch64", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Linux Enterprise Server 15 SP5-LTSS:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP4:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-4.1-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:WebKitGTK-6.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libjavascriptcoregtk-6_0-1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkit2gtk-4_1-0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libwebkitgtk-6_0-4-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-JavaScriptCore-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:typelib-1_0-WebKit2WebExtension-4_1-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk-4_1-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP5:webkitgtk-6_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Proxy 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Proxy 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:WebKitGTK-4.0-lang-2.46.6-150400.4.106.1.noarch", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libjavascriptcoregtk-4_0-18-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:libwebkit2gtk-4_0-37-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk-4_0-injected-bundles-2.46.6-150400.4.106.1.x86_64", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.ppc64le", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.s390x", "SUSE Manager Server 4.3:webkit2gtk3-soup2-devel-2.46.6-150400.4.106.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-21T15:38:46Z", "details": "important" } ], "title": "CVE-2025-24162" } ] }
suse-su-2025:0639-1
Vulnerability from csaf_suse
Published
2025-02-21 18:56
Modified
2025-02-21 18:56
Summary
Security update for webkit2gtk3
Notes
Title of the patch
Security update for webkit2gtk3
Description of the patch
This update for webkit2gtk3 fixes the following issues:
Update to version 2.46.6 (bsc#1236946):
- CVE-2025-24143: A maliciously crafted webpage may be able to fingerprint the user.
- CVE-2025-24150: Copying a URL from Web Inspector may lead to command injection.
- CVE-2025-24158: Processing web content may lead to a denial-of-service.
- CVE-2025-24162: Processing maliciously crafted web content may lead to an unexpected process crash.
Already fixed in previous releases:
- CVE-2024-54543: Processing maliciously crafted web content may lead to memory corruption.
- CVE-2024-27856: Processing a file may lead to unexpected app termination or arbitrary code execution.
- CVE-2024-54658: Processing web content may lead to a denial-of-service.
Patchnames
SUSE-2025-639,SUSE-SLE-SERVER-12-SP5-LTSS-2025-639,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-639
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for webkit2gtk3", "title": "Title of the patch" }, { "category": "description", "text": "This update for webkit2gtk3 fixes the following issues:\n\nUpdate to version 2.46.6 (bsc#1236946):\n\n- CVE-2025-24143: A maliciously crafted webpage may be able to fingerprint the user.\n- CVE-2025-24150: Copying a URL from Web Inspector may lead to command injection.\n- CVE-2025-24158: Processing web content may lead to a denial-of-service.\n- CVE-2025-24162: Processing maliciously crafted web content may lead to an unexpected process crash.\n\nAlready fixed in previous releases:\n\n- CVE-2024-54543: Processing maliciously crafted web content may lead to memory corruption.\n- CVE-2024-27856: Processing a file may lead to unexpected app termination or arbitrary code execution.\n- CVE-2024-54658: Processing web content may lead to a denial-of-service.\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-639,SUSE-SLE-SERVER-12-SP5-LTSS-2025-639,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-639", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_0639-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:0639-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250639-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:0639-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020408.html" }, { "category": "self", "summary": "SUSE Bug 1236946", "url": "https://bugzilla.suse.com/1236946" }, { "category": "self", "summary": "SUSE CVE CVE-2024-27856 page", "url": "https://www.suse.com/security/cve/CVE-2024-27856/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-54543 page", "url": "https://www.suse.com/security/cve/CVE-2024-54543/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-54658 page", "url": "https://www.suse.com/security/cve/CVE-2024-54658/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24143 page", "url": "https://www.suse.com/security/cve/CVE-2025-24143/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24150 page", "url": "https://www.suse.com/security/cve/CVE-2025-24150/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24158 page", "url": "https://www.suse.com/security/cve/CVE-2025-24158/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24162 page", "url": "https://www.suse.com/security/cve/CVE-2025-24162/" } ], "title": "Security update for webkit2gtk3", "tracking": { "current_release_date": "2025-02-21T18:56:51Z", "generator": { "date": "2025-02-21T18:56:51Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:0639-1", "initial_release_date": "2025-02-21T18:56:51Z", "revision_history": [ { "date": "2025-02-21T18:56:51Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.aarch64", "product": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.aarch64", "product_id": "libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.aarch64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.46.6-4.28.1.aarch64", "product": { "name": "libwebkit2gtk-4_0-37-2.46.6-4.28.1.aarch64", "product_id": "libwebkit2gtk-4_0-37-2.46.6-4.28.1.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.aarch64", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.aarch64", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.aarch64", "product": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.aarch64", "product_id": "typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.aarch64", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.aarch64", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.aarch64" } }, { "category": "product_version", "name": "webkit-jsc-4-2.46.6-4.28.1.aarch64", "product": { "name": "webkit-jsc-4-2.46.6-4.28.1.aarch64", "product_id": "webkit-jsc-4-2.46.6-4.28.1.aarch64" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.aarch64", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.aarch64", "product_id": "webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.aarch64" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.46.6-4.28.1.aarch64", "product": { "name": "webkit2gtk3-devel-2.46.6-4.28.1.aarch64", "product_id": "webkit2gtk3-devel-2.46.6-4.28.1.aarch64" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.46.6-4.28.1.aarch64", "product": { "name": "webkit2gtk3-minibrowser-2.46.6-4.28.1.aarch64", "product_id": "webkit2gtk3-minibrowser-2.46.6-4.28.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-64bit-2.46.6-4.28.1.aarch64_ilp32", "product": { "name": "libjavascriptcoregtk-4_0-18-64bit-2.46.6-4.28.1.aarch64_ilp32", "product_id": "libjavascriptcoregtk-4_0-18-64bit-2.46.6-4.28.1.aarch64_ilp32" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-64bit-2.46.6-4.28.1.aarch64_ilp32", "product": { "name": "libwebkit2gtk-4_0-37-64bit-2.46.6-4.28.1.aarch64_ilp32", "product_id": "libwebkit2gtk-4_0-37-64bit-2.46.6-4.28.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.i586", "product": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.i586", "product_id": "libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.i586" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.46.6-4.28.1.i586", "product": { "name": "libwebkit2gtk-4_0-37-2.46.6-4.28.1.i586", "product_id": "libwebkit2gtk-4_0-37-2.46.6-4.28.1.i586" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.i586", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.i586", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.i586" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.i586", "product": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.i586", "product_id": "typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.i586" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.i586", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.i586", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.i586" } }, { "category": "product_version", "name": "webkit-jsc-4-2.46.6-4.28.1.i586", "product": { "name": "webkit-jsc-4-2.46.6-4.28.1.i586", "product_id": "webkit-jsc-4-2.46.6-4.28.1.i586" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.i586", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.i586", "product_id": "webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.i586" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.46.6-4.28.1.i586", "product": { "name": "webkit2gtk3-devel-2.46.6-4.28.1.i586", "product_id": "webkit2gtk3-devel-2.46.6-4.28.1.i586" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.46.6-4.28.1.i586", "product": { "name": "webkit2gtk3-minibrowser-2.46.6-4.28.1.i586", "product_id": "webkit2gtk3-minibrowser-2.46.6-4.28.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "product": { "name": "libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "product_id": "libwebkit2gtk3-lang-2.46.6-4.28.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.ppc64le", "product": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.ppc64le", "product_id": "libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.ppc64le" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.46.6-4.28.1.ppc64le", "product": { "name": "libwebkit2gtk-4_0-37-2.46.6-4.28.1.ppc64le", "product_id": "libwebkit2gtk-4_0-37-2.46.6-4.28.1.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.ppc64le", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.ppc64le", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.ppc64le", "product": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.ppc64le", "product_id": "typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.ppc64le", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.ppc64le", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.ppc64le" } }, { "category": "product_version", "name": "webkit-jsc-4-2.46.6-4.28.1.ppc64le", "product": { "name": "webkit-jsc-4-2.46.6-4.28.1.ppc64le", "product_id": "webkit-jsc-4-2.46.6-4.28.1.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.ppc64le", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.ppc64le", "product_id": "webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.46.6-4.28.1.ppc64le", "product": { "name": "webkit2gtk3-devel-2.46.6-4.28.1.ppc64le", "product_id": "webkit2gtk3-devel-2.46.6-4.28.1.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.46.6-4.28.1.ppc64le", "product": { "name": "webkit2gtk3-minibrowser-2.46.6-4.28.1.ppc64le", "product_id": "webkit2gtk3-minibrowser-2.46.6-4.28.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.s390x", "product": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.s390x", "product_id": "libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.s390x" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.46.6-4.28.1.s390x", "product": { "name": "libwebkit2gtk-4_0-37-2.46.6-4.28.1.s390x", "product_id": "libwebkit2gtk-4_0-37-2.46.6-4.28.1.s390x" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.s390x", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.s390x", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.s390x" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.s390x", "product": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.s390x", "product_id": "typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.s390x" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.s390x", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.s390x", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.s390x" } }, { "category": "product_version", "name": "webkit-jsc-4-2.46.6-4.28.1.s390x", "product": { "name": "webkit-jsc-4-2.46.6-4.28.1.s390x", "product_id": "webkit-jsc-4-2.46.6-4.28.1.s390x" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.s390x", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.s390x", "product_id": "webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.s390x" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.46.6-4.28.1.s390x", "product": { "name": "webkit2gtk3-devel-2.46.6-4.28.1.s390x", "product_id": "webkit2gtk3-devel-2.46.6-4.28.1.s390x" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.46.6-4.28.1.s390x", "product": { "name": "webkit2gtk3-minibrowser-2.46.6-4.28.1.s390x", "product_id": "webkit2gtk3-minibrowser-2.46.6-4.28.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "product": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "product_id": "libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64" } }, { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-32bit-2.46.6-4.28.1.x86_64", "product": { "name": "libjavascriptcoregtk-4_0-18-32bit-2.46.6-4.28.1.x86_64", "product_id": "libjavascriptcoregtk-4_0-18-32bit-2.46.6-4.28.1.x86_64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "product": { "name": "libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "product_id": "libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-32bit-2.46.6-4.28.1.x86_64", "product": { "name": "libwebkit2gtk-4_0-37-32bit-2.46.6-4.28.1.x86_64", "product_id": "libwebkit2gtk-4_0-37-32bit-2.46.6-4.28.1.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "product": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "product_id": "typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64" } }, { "category": "product_version", "name": "webkit-jsc-4-2.46.6-4.28.1.x86_64", "product": { "name": "webkit-jsc-4-2.46.6-4.28.1.x86_64", "product_id": "webkit-jsc-4-2.46.6-4.28.1.x86_64" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "product_id": "webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.46.6-4.28.1.x86_64", "product": { "name": "webkit2gtk3-devel-2.46.6-4.28.1.x86_64", "product_id": "webkit2gtk3-devel-2.46.6-4.28.1.x86_64" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.46.6-4.28.1.x86_64", "product": { "name": "webkit2gtk3-minibrowser-2.46.6-4.28.1.x86_64", "product_id": "webkit2gtk3-minibrowser-2.46.6-4.28.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP5-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp5" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product": { "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.aarch64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.ppc64le" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.s390x" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-4.28.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.aarch64" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-4.28.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-4.28.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.ppc64le" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-4.28.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-4.28.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.s390x" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-4.28.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.46.6-4.28.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch" }, "product_reference": "libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.aarch64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.ppc64le" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.s390x" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.s390x" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.s390x" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.aarch64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.ppc64le" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.s390x" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-4.28.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.aarch64" }, "product_reference": "webkit2gtk3-devel-2.46.6-4.28.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-4.28.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.ppc64le" }, "product_reference": "webkit2gtk3-devel-2.46.6-4.28.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-4.28.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.s390x" }, "product_reference": "webkit2gtk3-devel-2.46.6-4.28.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-4.28.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.x86_64" }, "product_reference": "webkit2gtk3-devel-2.46.6-4.28.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.46.6-4.28.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch" }, "product_reference": "libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-4.28.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk3-devel-2.46.6-4.28.1.x86_64" }, "product_reference": "webkit2gtk3-devel-2.46.6-4.28.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-27856", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-27856" } ], "notes": [ { "category": "general", "text": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.5, iOS 16.7.8 and iPadOS 16.7.8, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, tvOS 17.5, visionOS 1.2. Processing a file may lead to unexpected app termination or arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk3-devel-2.46.6-4.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-27856", "url": "https://www.suse.com/security/cve/CVE-2024-27856" }, { "category": "external", "summary": "SUSE Bug 1236946 for CVE-2024-27856", "url": "https://bugzilla.suse.com/1236946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk3-devel-2.46.6-4.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk3-devel-2.46.6-4.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-21T18:56:51Z", "details": "important" } ], "title": "CVE-2024-27856" }, { "cve": "CVE-2024-54543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-54543" } ], "notes": [ { "category": "general", "text": "The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.2, tvOS 18.2, Safari 18.2, watchOS 11.2, iOS 18.2 and iPadOS 18.2, macOS Sequoia 15.2. Processing maliciously crafted web content may lead to memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk3-devel-2.46.6-4.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-54543", "url": "https://www.suse.com/security/cve/CVE-2024-54543" }, { "category": "external", "summary": "SUSE Bug 1236946 for CVE-2024-54543", "url": "https://bugzilla.suse.com/1236946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk3-devel-2.46.6-4.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk3-devel-2.46.6-4.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-21T18:56:51Z", "details": "important" } ], "title": "CVE-2024-54543" }, { "cve": "CVE-2024-54658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-54658" } ], "notes": [ { "category": "general", "text": "The issue was addressed with improved memory handling. This issue is fixed in iOS 17.4 and iPadOS 17.4, Safari 17.4, tvOS 17.4, watchOS 10.4, visionOS 1.1, macOS Sonoma 14.4. Processing web content may lead to a denial-of-service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk3-devel-2.46.6-4.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-54658", "url": "https://www.suse.com/security/cve/CVE-2024-54658" }, { "category": "external", "summary": "SUSE Bug 1236946 for CVE-2024-54658", "url": "https://bugzilla.suse.com/1236946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk3-devel-2.46.6-4.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk3-devel-2.46.6-4.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-21T18:56:51Z", "details": "important" } ], "title": "CVE-2024-54658" }, { "cve": "CVE-2025-24143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24143" } ], "notes": [ { "category": "general", "text": "The issue was addressed with improved access restrictions to the file system. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, visionOS 2.3. A maliciously crafted webpage may be able to fingerprint the user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk3-devel-2.46.6-4.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24143", "url": "https://www.suse.com/security/cve/CVE-2025-24143" }, { "category": "external", "summary": "SUSE Bug 1236946 for CVE-2025-24143", "url": "https://bugzilla.suse.com/1236946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk3-devel-2.46.6-4.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk3-devel-2.46.6-4.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-21T18:56:51Z", "details": "important" } ], "title": "CVE-2025-24143" }, { "cve": "CVE-2025-24150", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24150" } ], "notes": [ { "category": "general", "text": "A privacy issue was addressed with improved handling of files. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3. Copying a URL from Web Inspector may lead to command injection.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk3-devel-2.46.6-4.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24150", "url": "https://www.suse.com/security/cve/CVE-2025-24150" }, { "category": "external", "summary": "SUSE Bug 1236946 for CVE-2025-24150", "url": "https://bugzilla.suse.com/1236946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk3-devel-2.46.6-4.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk3-devel-2.46.6-4.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-21T18:56:51Z", "details": "important" } ], "title": "CVE-2025-24150" }, { "cve": "CVE-2025-24158", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24158" } ], "notes": [ { "category": "general", "text": "The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Processing web content may lead to a denial-of-service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk3-devel-2.46.6-4.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24158", "url": "https://www.suse.com/security/cve/CVE-2025-24158" }, { "category": "external", "summary": "SUSE Bug 1236946 for CVE-2025-24158", "url": "https://bugzilla.suse.com/1236946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk3-devel-2.46.6-4.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk3-devel-2.46.6-4.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-21T18:56:51Z", "details": "important" } ], "title": "CVE-2025-24158" }, { "cve": "CVE-2025-24162", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24162" } ], "notes": [ { "category": "general", "text": "This issue was addressed through improved state management. This issue is fixed in visionOS 2.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Processing maliciously crafted web content may lead to an unexpected process crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk3-devel-2.46.6-4.28.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24162", "url": "https://www.suse.com/security/cve/CVE-2025-24162" }, { "category": "external", "summary": "SUSE Bug 1236946 for CVE-2025-24162", "url": "https://bugzilla.suse.com/1236946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk3-devel-2.46.6-4.28.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.aarch64", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.ppc64le", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.s390x", "SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libjavascriptcoregtk-4_0-18-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk-4_0-37-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk3-lang-2.46.6-4.28.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk-4_0-injected-bundles-2.46.6-4.28.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk3-devel-2.46.6-4.28.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-21T18:56:51Z", "details": "important" } ], "title": "CVE-2025-24162" } ] }
suse-su-2025:0735-1
Vulnerability from csaf_suse
Published
2025-02-26 18:34
Modified
2025-02-26 18:34
Summary
Security update for webkit2gtk3
Notes
Title of the patch
Security update for webkit2gtk3
Description of the patch
This update for webkit2gtk3 fixes the following issues:
Update to version 2.46.6 (bsc#1236946, bsc#1234851):
- CVE-2025-24143: A maliciously crafted webpage may be able to fingerprint the user.
- CVE-2025-24150: Copying a URL from Web Inspector may lead to command injection.
- CVE-2025-24158: Processing web content may lead to a denial-of-service.
- CVE-2025-24162: Processing maliciously crafted web content may lead to an unexpected process crash.
- CVE-2024-54479: Processing maliciously crafted web content may lead to an unexpected process crash.
- CVE-2024-54502: Processing maliciously crafted web content may lead to an unexpected process crash.
- CVE-2024-54505: Processing maliciously crafted web content may lead to memory corruption.
- CVE-2024-54508: Processing maliciously crafted web content may lead to an unexpected process crash.
- CVE-2024-54543: Processing maliciously crafted web content may lead to memory corruption.
Already fixed in previous releases:
- CVE-2024-27856: Processing a file may lead to unexpected app termination or arbitrary code execution.
- CVE-2024-54534: Processing maliciously crafted web content may lead to memory corruption.
- CVE-2024-54658: Processing web content may lead to a denial-of-service.
Patchnames
SUSE-2025-735,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-735,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-735,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-735,SUSE-Storage-7.1-2025-735
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for webkit2gtk3", "title": "Title of the patch" }, { "category": "description", "text": "This update for webkit2gtk3 fixes the following issues:\n\nUpdate to version 2.46.6 (bsc#1236946, bsc#1234851):\n\n- CVE-2025-24143: A maliciously crafted webpage may be able to fingerprint the user.\n- CVE-2025-24150: Copying a URL from Web Inspector may lead to command injection.\n- CVE-2025-24158: Processing web content may lead to a denial-of-service.\n- CVE-2025-24162: Processing maliciously crafted web content may lead to an unexpected process crash.\n- CVE-2024-54479: Processing maliciously crafted web content may lead to an unexpected process crash.\n- CVE-2024-54502: Processing maliciously crafted web content may lead to an unexpected process crash.\n- CVE-2024-54505: Processing maliciously crafted web content may lead to memory corruption.\n- CVE-2024-54508: Processing maliciously crafted web content may lead to an unexpected process crash.\n- CVE-2024-54543: Processing maliciously crafted web content may lead to memory corruption.\n \nAlready fixed in previous releases:\n\n- CVE-2024-27856: Processing a file may lead to unexpected app termination or arbitrary code execution.\n- CVE-2024-54534: Processing maliciously crafted web content may lead to memory corruption.\n- CVE-2024-54658: Processing web content may lead to a denial-of-service.\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-735,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-735,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-735,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-735,SUSE-Storage-7.1-2025-735", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_0735-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:0735-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20250735-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:0735-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020451.html" }, { "category": "self", "summary": "SUSE Bug 1234851", "url": "https://bugzilla.suse.com/1234851" }, { "category": "self", "summary": "SUSE Bug 1236946", "url": "https://bugzilla.suse.com/1236946" }, { "category": "self", "summary": "SUSE CVE CVE-2024-27856 page", "url": "https://www.suse.com/security/cve/CVE-2024-27856/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-54479 page", "url": "https://www.suse.com/security/cve/CVE-2024-54479/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-54502 page", "url": "https://www.suse.com/security/cve/CVE-2024-54502/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-54505 page", "url": "https://www.suse.com/security/cve/CVE-2024-54505/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-54508 page", "url": "https://www.suse.com/security/cve/CVE-2024-54508/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-54534 page", "url": "https://www.suse.com/security/cve/CVE-2024-54534/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-54543 page", "url": "https://www.suse.com/security/cve/CVE-2024-54543/" }, { "category": "self", "summary": "SUSE CVE CVE-2024-54658 page", "url": "https://www.suse.com/security/cve/CVE-2024-54658/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24143 page", "url": "https://www.suse.com/security/cve/CVE-2025-24143/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24150 page", "url": "https://www.suse.com/security/cve/CVE-2025-24150/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24158 page", "url": "https://www.suse.com/security/cve/CVE-2025-24158/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-24162 page", "url": "https://www.suse.com/security/cve/CVE-2025-24162/" } ], "title": "Security update for webkit2gtk3", "tracking": { "current_release_date": "2025-02-26T18:34:59Z", "generator": { "date": "2025-02-26T18:34:59Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:0735-1", "initial_release_date": "2025-02-26T18:34:59Z", "revision_history": [ { "date": "2025-02-26T18:34:59Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "product": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "product_id": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "product": { "name": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "product_id": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "product": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "product_id": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64" } }, { "category": "product_version", "name": "webkit-jsc-4-2.46.6-150200.133.1.aarch64", "product": { "name": "webkit-jsc-4-2.46.6-150200.133.1.aarch64", "product_id": "webkit-jsc-4-2.46.6-150200.133.1.aarch64" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "product_id": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "product": { "name": "webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "product_id": "webkit2gtk3-devel-2.46.6-150200.133.1.aarch64" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.46.6-150200.133.1.aarch64", "product": { "name": "webkit2gtk3-minibrowser-2.46.6-150200.133.1.aarch64", "product_id": "webkit2gtk3-minibrowser-2.46.6-150200.133.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-64bit-2.46.6-150200.133.1.aarch64_ilp32", "product": { "name": "libjavascriptcoregtk-4_0-18-64bit-2.46.6-150200.133.1.aarch64_ilp32", "product_id": "libjavascriptcoregtk-4_0-18-64bit-2.46.6-150200.133.1.aarch64_ilp32" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-64bit-2.46.6-150200.133.1.aarch64_ilp32", "product": { "name": "libwebkit2gtk-4_0-37-64bit-2.46.6-150200.133.1.aarch64_ilp32", "product_id": "libwebkit2gtk-4_0-37-64bit-2.46.6-150200.133.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.i586", "product": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.i586", "product_id": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.i586" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.i586", "product": { "name": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.i586", "product_id": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.i586" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.i586", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.i586", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.i586" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.i586", "product": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.i586", "product_id": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.i586" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.i586", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.i586", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.i586" } }, { "category": "product_version", "name": "webkit-jsc-4-2.46.6-150200.133.1.i586", "product": { "name": "webkit-jsc-4-2.46.6-150200.133.1.i586", "product_id": "webkit-jsc-4-2.46.6-150200.133.1.i586" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.i586", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.i586", "product_id": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.i586" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.46.6-150200.133.1.i586", "product": { "name": "webkit2gtk3-devel-2.46.6-150200.133.1.i586", "product_id": "webkit2gtk3-devel-2.46.6-150200.133.1.i586" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.46.6-150200.133.1.i586", "product": { "name": "webkit2gtk3-minibrowser-2.46.6-150200.133.1.i586", "product_id": "webkit2gtk3-minibrowser-2.46.6-150200.133.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "product": { "name": "libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "product_id": "libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "product": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "product_id": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "product": { "name": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "product_id": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "product": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "product_id": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le" } }, { "category": "product_version", "name": "webkit-jsc-4-2.46.6-150200.133.1.ppc64le", "product": { "name": "webkit-jsc-4-2.46.6-150200.133.1.ppc64le", "product_id": "webkit-jsc-4-2.46.6-150200.133.1.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "product_id": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "product": { "name": "webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "product_id": "webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.46.6-150200.133.1.ppc64le", "product": { "name": "webkit2gtk3-minibrowser-2.46.6-150200.133.1.ppc64le", "product_id": "webkit2gtk3-minibrowser-2.46.6-150200.133.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "product": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "product_id": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "product": { "name": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "product_id": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "product": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "product_id": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x" } }, { "category": "product_version", "name": "webkit-jsc-4-2.46.6-150200.133.1.s390x", "product": { "name": "webkit-jsc-4-2.46.6-150200.133.1.s390x", "product_id": "webkit-jsc-4-2.46.6-150200.133.1.s390x" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "product_id": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "product": { "name": "webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "product_id": "webkit2gtk3-devel-2.46.6-150200.133.1.s390x" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.46.6-150200.133.1.s390x", "product": { "name": "webkit2gtk3-minibrowser-2.46.6-150200.133.1.s390x", "product_id": "webkit2gtk3-minibrowser-2.46.6-150200.133.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "product": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "product_id": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64" } }, { "category": "product_version", "name": "libjavascriptcoregtk-4_0-18-32bit-2.46.6-150200.133.1.x86_64", "product": { "name": "libjavascriptcoregtk-4_0-18-32bit-2.46.6-150200.133.1.x86_64", "product_id": "libjavascriptcoregtk-4_0-18-32bit-2.46.6-150200.133.1.x86_64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "product": { "name": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "product_id": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64" } }, { "category": "product_version", "name": "libwebkit2gtk-4_0-37-32bit-2.46.6-150200.133.1.x86_64", "product": { "name": "libwebkit2gtk-4_0-37-32bit-2.46.6-150200.133.1.x86_64", "product_id": "libwebkit2gtk-4_0-37-32bit-2.46.6-150200.133.1.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "product": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "product_id": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "product": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "product_id": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "product": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64" } }, { "category": "product_version", "name": "webkit-jsc-4-2.46.6-150200.133.1.x86_64", "product": { "name": "webkit-jsc-4-2.46.6-150200.133.1.x86_64", "product_id": "webkit-jsc-4-2.46.6-150200.133.1.x86_64" } }, { "category": "product_version", "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "product": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "product_id": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64" } }, { "category": "product_version", "name": "webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "product": { "name": "webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "product_id": "webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" } }, { "category": "product_version", "name": "webkit2gtk3-minibrowser-2.46.6-150200.133.1.x86_64", "product": { "name": "webkit2gtk3-minibrowser-2.46.6-150200.133.1.x86_64", "product_id": "webkit2gtk3-minibrowser-2.46.6-150200.133.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:15:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:15:sp3" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 7.1", "product": { "name": "SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:7.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch" }, "product_reference": "libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150200.133.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64" }, "product_reference": "webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150200.133.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" }, "product_reference": "webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch" }, "product_reference": "libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150200.133.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64" }, "product_reference": "webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le" }, "product_reference": "webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150200.133.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x" }, "product_reference": "webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150200.133.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" }, "product_reference": "webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch" }, "product_reference": "libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le" }, "product_reference": "webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150200.133.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" }, "product_reference": "webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64" }, "product_reference": "libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64" }, "product_reference": "libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch" }, "product_reference": "libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64" }, "product_reference": "typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64" }, "product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64" }, "product_reference": "webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150200.133.1.aarch64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64" }, "product_reference": "webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-2.46.6-150200.133.1.x86_64 as component of SUSE Enterprise Storage 7.1", "product_id": "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" }, "product_reference": "webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 7.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-27856", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-27856" } ], "notes": [ { "category": "general", "text": "The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.5, iOS 16.7.8 and iPadOS 16.7.8, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, tvOS 17.5, visionOS 1.2. Processing a file may lead to unexpected app termination or arbitrary code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-27856", "url": "https://www.suse.com/security/cve/CVE-2024-27856" }, { "category": "external", "summary": "SUSE Bug 1236946 for CVE-2024-27856", "url": "https://bugzilla.suse.com/1236946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-26T18:34:59Z", "details": "important" } ], "title": "CVE-2024-27856" }, { "cve": "CVE-2024-54479", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-54479" } ], "notes": [ { "category": "general", "text": "The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.3, watchOS 11.2, visionOS 2.2, tvOS 18.2, macOS Sequoia 15.2, Safari 18.2, iOS 18.2 and iPadOS 18.2. Processing maliciously crafted web content may lead to an unexpected process crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-54479", "url": "https://www.suse.com/security/cve/CVE-2024-54479" }, { "category": "external", "summary": "SUSE Bug 1234851 for CVE-2024-54479", "url": "https://bugzilla.suse.com/1234851" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-26T18:34:59Z", "details": "important" } ], "title": "CVE-2024-54479" }, { "cve": "CVE-2024-54502", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-54502" } ], "notes": [ { "category": "general", "text": "The issue was addressed with improved checks. This issue is fixed in watchOS 11.2, visionOS 2.2, tvOS 18.2, macOS Sequoia 15.2, Safari 18.2, iOS 18.2 and iPadOS 18.2. Processing maliciously crafted web content may lead to an unexpected process crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-54502", "url": "https://www.suse.com/security/cve/CVE-2024-54502" }, { "category": "external", "summary": "SUSE Bug 1234851 for CVE-2024-54502", "url": "https://bugzilla.suse.com/1234851" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-26T18:34:59Z", "details": "important" } ], "title": "CVE-2024-54502" }, { "cve": "CVE-2024-54505", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-54505" } ], "notes": [ { "category": "general", "text": "A type confusion issue was addressed with improved memory handling. This issue is fixed in iPadOS 17.7.3, watchOS 11.2, visionOS 2.2, tvOS 18.2, macOS Sequoia 15.2, Safari 18.2, iOS 18.2 and iPadOS 18.2. Processing maliciously crafted web content may lead to memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-54505", "url": "https://www.suse.com/security/cve/CVE-2024-54505" }, { "category": "external", "summary": "SUSE Bug 1234851 for CVE-2024-54505", "url": "https://bugzilla.suse.com/1234851" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-26T18:34:59Z", "details": "important" } ], "title": "CVE-2024-54505" }, { "cve": "CVE-2024-54508", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-54508" } ], "notes": [ { "category": "general", "text": "The issue was addressed with improved memory handling. This issue is fixed in watchOS 11.2, visionOS 2.2, tvOS 18.2, macOS Sequoia 15.2, Safari 18.2, iOS 18.2 and iPadOS 18.2. Processing maliciously crafted web content may lead to an unexpected process crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-54508", "url": "https://www.suse.com/security/cve/CVE-2024-54508" }, { "category": "external", "summary": "SUSE Bug 1234851 for CVE-2024-54508", "url": "https://bugzilla.suse.com/1234851" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-26T18:34:59Z", "details": "important" } ], "title": "CVE-2024-54508" }, { "cve": "CVE-2024-54534", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-54534" } ], "notes": [ { "category": "general", "text": "The issue was addressed with improved memory handling. This issue is fixed in watchOS 11.2, visionOS 2.2, tvOS 18.2, macOS Sequoia 15.2, Safari 18.2, iOS 18.2 and iPadOS 18.2. Processing maliciously crafted web content may lead to memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-54534", "url": "https://www.suse.com/security/cve/CVE-2024-54534" }, { "category": "external", "summary": "SUSE Bug 1234851 for CVE-2024-54534", "url": "https://bugzilla.suse.com/1234851" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-26T18:34:59Z", "details": "important" } ], "title": "CVE-2024-54534" }, { "cve": "CVE-2024-54543", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-54543" } ], "notes": [ { "category": "general", "text": "The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.2, tvOS 18.2, Safari 18.2, watchOS 11.2, iOS 18.2 and iPadOS 18.2, macOS Sequoia 15.2. Processing maliciously crafted web content may lead to memory corruption.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-54543", "url": "https://www.suse.com/security/cve/CVE-2024-54543" }, { "category": "external", "summary": "SUSE Bug 1236946 for CVE-2024-54543", "url": "https://bugzilla.suse.com/1236946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-26T18:34:59Z", "details": "important" } ], "title": "CVE-2024-54543" }, { "cve": "CVE-2024-54658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2024-54658" } ], "notes": [ { "category": "general", "text": "The issue was addressed with improved memory handling. This issue is fixed in iOS 17.4 and iPadOS 17.4, Safari 17.4, tvOS 17.4, watchOS 10.4, visionOS 1.1, macOS Sonoma 14.4. Processing web content may lead to a denial-of-service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2024-54658", "url": "https://www.suse.com/security/cve/CVE-2024-54658" }, { "category": "external", "summary": "SUSE Bug 1236946 for CVE-2024-54658", "url": "https://bugzilla.suse.com/1236946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-26T18:34:59Z", "details": "important" } ], "title": "CVE-2024-54658" }, { "cve": "CVE-2025-24143", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24143" } ], "notes": [ { "category": "general", "text": "The issue was addressed with improved access restrictions to the file system. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, visionOS 2.3. A maliciously crafted webpage may be able to fingerprint the user.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24143", "url": "https://www.suse.com/security/cve/CVE-2025-24143" }, { "category": "external", "summary": "SUSE Bug 1236946 for CVE-2025-24143", "url": "https://bugzilla.suse.com/1236946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-26T18:34:59Z", "details": "important" } ], "title": "CVE-2025-24143" }, { "cve": "CVE-2025-24150", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24150" } ], "notes": [ { "category": "general", "text": "A privacy issue was addressed with improved handling of files. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3. Copying a URL from Web Inspector may lead to command injection.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24150", "url": "https://www.suse.com/security/cve/CVE-2025-24150" }, { "category": "external", "summary": "SUSE Bug 1236946 for CVE-2025-24150", "url": "https://bugzilla.suse.com/1236946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-26T18:34:59Z", "details": "important" } ], "title": "CVE-2025-24150" }, { "cve": "CVE-2025-24158", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24158" } ], "notes": [ { "category": "general", "text": "The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Processing web content may lead to a denial-of-service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24158", "url": "https://www.suse.com/security/cve/CVE-2025-24158" }, { "category": "external", "summary": "SUSE Bug 1236946 for CVE-2025-24158", "url": "https://bugzilla.suse.com/1236946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-26T18:34:59Z", "details": "important" } ], "title": "CVE-2025-24158" }, { "cve": "CVE-2025-24162", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-24162" } ], "notes": [ { "category": "general", "text": "This issue was addressed through improved state management. This issue is fixed in visionOS 2.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Processing maliciously crafted web content may lead to an unexpected process crash.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-24162", "url": "https://www.suse.com/security/cve/CVE-2025-24162" }, { "category": "external", "summary": "SUSE Bug 1236946 for CVE-2025-24162", "url": "https://bugzilla.suse.com/1236946" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Enterprise Storage 7.1:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.aarch64", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.s390x", "SUSE Linux Enterprise Server 15 SP3-LTSS:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libjavascriptcoregtk-4_0-18-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk-4_0-37-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libwebkit2gtk3-lang-2.46.6-150200.133.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-JavaScriptCore-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:typelib-1_0-WebKit2WebExtension-4_0-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk-4_0-injected-bundles-2.46.6-150200.133.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 15 SP3:webkit2gtk3-devel-2.46.6-150200.133.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-02-26T18:34:59Z", "details": "important" } ], "title": "CVE-2025-24162" } ] }
wid-sec-w-2025-0201
Vulnerability from csaf_certbund
Published
2025-01-27 23:00
Modified
2025-05-19 22:00
Summary
Apple macOS, iPadOS und iOS: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.
Das Apple iPadOS ist das Betriebssystem für das von Apple entwickelte iPad.
Das Apple iOS (vormals iPhone OS) ist das Betriebssystem für das von Apple entwickelte Smartphone iPhone, iPad und iPod Touch.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Apple macOS, Apple iPadOS und Apple iOS ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, beliebigen Code auszuführen, sensible Daten offenzulegen, Dateien zu manipulieren, erhöhte Rechte zu erlangen - einschließlich Root-Rechte, Sicherheitsmaßnahmen zu umgehen und einen Spoofing-Angriff zu starten.
Betroffene Betriebssysteme
- iPhoneOS
- MacOS X
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.\r\nDas Apple iPadOS ist das Betriebssystem f\u00fcr das von Apple entwickelte iPad.\r\nDas Apple iOS (vormals iPhone OS) ist das Betriebssystem f\u00fcr das von Apple entwickelte Smartphone iPhone, iPad und iPod Touch.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Apple macOS, Apple iPadOS und Apple iOS ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, beliebigen Code auszuf\u00fchren, sensible Daten offenzulegen, Dateien zu manipulieren, erh\u00f6hte Rechte zu erlangen - einschlie\u00dflich Root-Rechte, Sicherheitsma\u00dfnahmen zu umgehen und einen Spoofing-Angriff zu starten.", "title": "Angriff" }, { "category": "general", "text": "- iPhoneOS\n- MacOS X", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-0201 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0201.json" }, { "category": "self", "summary": "WID-SEC-2025-0201 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0201" }, { "category": "external", "summary": "About the security content of macOS Sequoia 15.3 vom 2025-01-27", "url": "https://support.apple.com/en-us/122068" }, { "category": "external", "summary": "About the security content of macOS Sonoma 14.7.3 vom 2025-01-27", "url": "https://support.apple.com/en-us/122069" }, { "category": "external", "summary": "About the security content of macOS Ventura 13.7.3 vom 2025-01-27", "url": "https://support.apple.com/en-us/122070" }, { "category": "external", "summary": "About the security content of iPadOS 17.7.4 vom 2025-01-27", "url": "https://support.apple.com/en-us/122067" }, { "category": "external", "summary": "About the security content of iOS 18.3 and iPadOS 18.3 vom 2025-01-27", "url": "https://support.apple.com/en-us/122066" } ], "source_lang": "en-US", "title": "Apple macOS, iPadOS und iOS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-05-19T22:00:00.000+00:00", "generator": { "date": "2025-05-20T07:37:27.650+00:00", "engine": { "name": "BSI-WID", "version": "1.3.12" } }, "id": "WID-SEC-W-2025-0201", "initial_release_date": "2025-01-27T23:00:00.000+00:00", "revision_history": [ { "date": "2025-01-27T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-01-30T23:00:00.000+00:00", "number": "2", "summary": "CVE-2025-24099 erg\u00e4nzt" }, { "date": "2025-03-27T23:00:00.000+00:00", "number": "3", "summary": "CVE-2025-24185 erg\u00e4nzt" }, { "date": "2025-05-12T22:00:00.000+00:00", "number": "4", "summary": "CVE\u0027s erg\u00e4nzt" }, { "date": "2025-05-19T22:00:00.000+00:00", "number": "5", "summary": "CVE-Nummern erg\u00e4nzt" } ], "status": "final", "version": "5" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c18.3", "product": { "name": "Apple iOS \u003c18.3", "product_id": "T040646" } }, { "category": "product_version", "name": "18.3", "product": { "name": "Apple iOS 18.3", "product_id": "T040646-fixed", "product_identification_helper": { "cpe": "cpe:/o:apple:iphone_os:18.3" } } } ], "category": "product_name", "name": "iOS" }, { "branches": [ { "category": "product_version_range", "name": "\u003c17.7.4", "product": { "name": "Apple iPadOS \u003c17.7.4", "product_id": "T040644" } }, { "category": "product_version", "name": "17.7.4", "product": { "name": "Apple iPadOS 17.7.4", "product_id": "T040644-fixed", "product_identification_helper": { "cpe": "cpe:/o:apple:ipados:17.7.4" } } }, { "category": "product_version_range", "name": "\u003c18.3", "product": { "name": "Apple iPadOS \u003c18.3", "product_id": "T040645" } }, { "category": "product_version", "name": "18.3", "product": { "name": "Apple iPadOS 18.3", "product_id": "T040645-fixed", "product_identification_helper": { "cpe": "cpe:/o:apple:ipados:18.3" } } } ], "category": "product_name", "name": "iPadOS" }, { "branches": [ { "category": "product_version_range", "name": "Sequoia \u003c15.3", "product": { "name": "Apple macOS Sequoia \u003c15.3", "product_id": "T040641" } }, { "category": "product_version", "name": "Sequoia 15.3", "product": { "name": "Apple macOS Sequoia 15.3", "product_id": "T040641-fixed", "product_identification_helper": { "cpe": "cpe:/o:apple:mac_os:sequoia__15.3" } } }, { "category": "product_version_range", "name": "Sonoma \u003c14.7.3", "product": { "name": "Apple macOS Sonoma \u003c14.7.3", "product_id": "T040642" } }, { "category": "product_version", "name": "Sonoma 14.7.3", "product": { "name": "Apple macOS Sonoma 14.7.3", "product_id": "T040642-fixed", "product_identification_helper": { "cpe": "cpe:/o:apple:mac_os:sonoma__14.7.3" } } }, { "category": "product_version_range", "name": "Ventura \u003c13.7.3", "product": { "name": "Apple macOS Ventura \u003c13.7.3", "product_id": "T040643" } }, { "category": "product_version", "name": "Ventura 13.7.3", "product": { "name": "Apple macOS Ventura 13.7.3", "product_id": "T040643-fixed", "product_identification_helper": { "cpe": "cpe:/o:apple:mac_os:ventura__13.7.3" } } } ], "category": "product_name", "name": "macOS" } ], "category": "vendor", "name": "Apple" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-44172", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2024-44172" }, { "cve": "CVE-2024-44243", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2024-44243" }, { "cve": "CVE-2024-54478", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2024-54478" }, { "cve": "CVE-2024-54497", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2024-54497" }, { "cve": "CVE-2024-54509", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2024-54509" }, { "cve": "CVE-2024-9956", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2024-9956" }, { "cve": "CVE-2025-24085", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24085" }, { "cve": "CVE-2025-24086", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24086" }, { "cve": "CVE-2025-24087", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24087" }, { "cve": "CVE-2025-24092", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24092" }, { "cve": "CVE-2025-24093", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24093" }, { "cve": "CVE-2025-24094", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24094" }, { "cve": "CVE-2025-24096", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24096" }, { "cve": "CVE-2025-24099", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24099" }, { "cve": "CVE-2025-24100", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24100" }, { "cve": "CVE-2025-24101", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24101" }, { "cve": "CVE-2025-24102", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24102" }, { "cve": "CVE-2025-24103", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24103" }, { "cve": "CVE-2025-24104", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24104" }, { "cve": "CVE-2025-24106", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24106" }, { "cve": "CVE-2025-24107", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24107" }, { "cve": "CVE-2025-24108", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24108" }, { "cve": "CVE-2025-24109", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24109" }, { "cve": "CVE-2025-24112", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24112" }, { "cve": "CVE-2025-24113", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24113" }, { "cve": "CVE-2025-24114", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24114" }, { "cve": "CVE-2025-24115", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24115" }, { "cve": "CVE-2025-24116", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24116" }, { "cve": "CVE-2025-24117", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24117" }, { "cve": "CVE-2025-24118", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24118" }, { "cve": "CVE-2025-24120", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24120" }, { "cve": "CVE-2025-24121", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24121" }, { "cve": "CVE-2025-24122", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24122" }, { "cve": "CVE-2025-24123", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24123" }, { "cve": "CVE-2025-24124", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24124" }, { "cve": "CVE-2025-24126", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24126" }, { "cve": "CVE-2025-24127", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24127" }, { "cve": "CVE-2025-24128", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24128" }, { "cve": "CVE-2025-24129", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24129" }, { "cve": "CVE-2025-24130", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24130" }, { "cve": "CVE-2025-24131", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24131" }, { "cve": "CVE-2025-24134", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24134" }, { "cve": "CVE-2025-24135", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24135" }, { "cve": "CVE-2025-24136", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24136" }, { "cve": "CVE-2025-24137", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24137" }, { "cve": "CVE-2025-24138", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24138" }, { "cve": "CVE-2025-24139", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24139" }, { "cve": "CVE-2025-24140", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24140" }, { "cve": "CVE-2025-24141", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24141" }, { "cve": "CVE-2025-24143", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24143" }, { "cve": "CVE-2025-24145", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24145" }, { "cve": "CVE-2025-24146", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24146" }, { "cve": "CVE-2025-24149", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24149" }, { "cve": "CVE-2025-24150", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24150" }, { "cve": "CVE-2025-24151", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24151" }, { "cve": "CVE-2025-24152", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24152" }, { "cve": "CVE-2025-24153", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24153" }, { "cve": "CVE-2025-24154", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24154" }, { "cve": "CVE-2025-24156", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24156" }, { "cve": "CVE-2025-24158", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24158" }, { "cve": "CVE-2025-24159", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24159" }, { "cve": "CVE-2025-24160", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24160" }, { "cve": "CVE-2025-24161", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24161" }, { "cve": "CVE-2025-24162", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24162" }, { "cve": "CVE-2025-24163", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24163" }, { "cve": "CVE-2025-24166", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24166" }, { "cve": "CVE-2025-24169", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24169" }, { "cve": "CVE-2025-24174", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24174" }, { "cve": "CVE-2025-24176", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24176" }, { "cve": "CVE-2025-24177", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24177" }, { "cve": "CVE-2025-24179", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24179" }, { "cve": "CVE-2025-24183", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24183" }, { "cve": "CVE-2025-24184", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24184" }, { "cve": "CVE-2025-24185", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24185" }, { "cve": "CVE-2025-24189", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24189" }, { "cve": "CVE-2025-24855", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24855" }, { "cve": "CVE-2025-31185", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-31185" }, { "cve": "CVE-2025-31262", "product_status": { "known_affected": [ "T040646", "T040645", "T040644", "T040643", "T040642", "T040641" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-31262" } ] }
wid-sec-w-2025-0199
Vulnerability from csaf_certbund
Published
2025-01-27 23:00
Modified
2025-01-27 23:00
Summary
Apple Safari: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Safari ist der auf Apple Geräten eingesetzte Web Browser.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Apple Safari ausnutzen, um die Authentifizierung zu umgehen, einen Spoofing-Angriff durchzuführen, vertrauliche Informationen preiszugeben, einen Denial-of-Service-Zustand zu verursachen und beliebigen Code auszuführen.
Betroffene Betriebssysteme
- MacOS X
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Safari ist der auf Apple Ger\u00e4ten eingesetzte Web Browser.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Apple Safari ausnutzen, um die Authentifizierung zu umgehen, einen Spoofing-Angriff durchzuf\u00fchren, vertrauliche Informationen preiszugeben, einen Denial-of-Service-Zustand zu verursachen und beliebigen Code auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- MacOS X", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-0199 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0199.json" }, { "category": "self", "summary": "WID-SEC-2025-0199 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0199" }, { "category": "external", "summary": "About the security content of Safari 18.3 vom 2025-01-27", "url": "https://support.apple.com/en-us/122074" } ], "source_lang": "en-US", "title": "Apple Safari: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-01-27T23:00:00.000+00:00", "generator": { "date": "2025-01-28T09:41:53.097+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2025-0199", "initial_release_date": "2025-01-27T23:00:00.000+00:00", "revision_history": [ { "date": "2025-01-27T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c18.3", "product": { "name": "Apple Safari \u003c18.3", "product_id": "T040647" } }, { "category": "product_version", "name": "18.3", "product": { "name": "Apple Safari 18.3", "product_id": "T040647-fixed", "product_identification_helper": { "cpe": "cpe:/a:apple:safari:18.3" } } } ], "category": "product_name", "name": "Safari" } ], "category": "vendor", "name": "Apple" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-24113", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple Safari. Diese Schwachstellen bestehen in mehreren Komponenten, darunter Password, WebKit, WebKit Web Inspector und Safari, aufgrund verschiedener sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Authentifizierung zu umgehen, einen Spoofing-Angriff durchzuf\u00fchren, vertrauliche Informationen preiszugeben, einen Denial-of-Service-Zustand zu verursachen und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T040647" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24113" }, { "cve": "CVE-2025-24128", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple Safari. Diese Schwachstellen bestehen in mehreren Komponenten, darunter Password, WebKit, WebKit Web Inspector und Safari, aufgrund verschiedener sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Authentifizierung zu umgehen, einen Spoofing-Angriff durchzuf\u00fchren, vertrauliche Informationen preiszugeben, einen Denial-of-Service-Zustand zu verursachen und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T040647" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24128" }, { "cve": "CVE-2025-24143", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple Safari. Diese Schwachstellen bestehen in mehreren Komponenten, darunter Password, WebKit, WebKit Web Inspector und Safari, aufgrund verschiedener sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Authentifizierung zu umgehen, einen Spoofing-Angriff durchzuf\u00fchren, vertrauliche Informationen preiszugeben, einen Denial-of-Service-Zustand zu verursachen und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T040647" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24143" }, { "cve": "CVE-2025-24150", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple Safari. Diese Schwachstellen bestehen in mehreren Komponenten, darunter Password, WebKit, WebKit Web Inspector und Safari, aufgrund verschiedener sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Authentifizierung zu umgehen, einen Spoofing-Angriff durchzuf\u00fchren, vertrauliche Informationen preiszugeben, einen Denial-of-Service-Zustand zu verursachen und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T040647" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24150" }, { "cve": "CVE-2025-24158", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple Safari. Diese Schwachstellen bestehen in mehreren Komponenten, darunter Password, WebKit, WebKit Web Inspector und Safari, aufgrund verschiedener sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Authentifizierung zu umgehen, einen Spoofing-Angriff durchzuf\u00fchren, vertrauliche Informationen preiszugeben, einen Denial-of-Service-Zustand zu verursachen und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T040647" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24158" }, { "cve": "CVE-2025-24162", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple Safari. Diese Schwachstellen bestehen in mehreren Komponenten, darunter Password, WebKit, WebKit Web Inspector und Safari, aufgrund verschiedener sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Authentifizierung zu umgehen, einen Spoofing-Angriff durchzuf\u00fchren, vertrauliche Informationen preiszugeben, einen Denial-of-Service-Zustand zu verursachen und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T040647" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24162" }, { "cve": "CVE-2025-24169", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple Safari. Diese Schwachstellen bestehen in mehreren Komponenten, darunter Password, WebKit, WebKit Web Inspector und Safari, aufgrund verschiedener sicherheitsrelevanter Probleme. Ein Angreifer kann diese Schwachstellen ausnutzen, um die Authentifizierung zu umgehen, einen Spoofing-Angriff durchzuf\u00fchren, vertrauliche Informationen preiszugeben, einen Denial-of-Service-Zustand zu verursachen und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T040647" ] }, "release_date": "2025-01-27T23:00:00.000+00:00", "title": "CVE-2025-24169" } ] }
wid-sec-w-2025-0301
Vulnerability from csaf_certbund
Published
2025-02-09 23:00
Modified
2025-05-29 22:00
Summary
WebKit (GTK und WPE): Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
WebKit ist die Webbrowser-Engine, die von Safari und vielen anderen Apps auf macOS, iOS und Linux verwendet wird.
Angriff
Ein Angreifer kann mehrere Schwachstellen in WebKit ausnutzen, um beliebigen Code auszuführen, vertrauliche Informationen preiszugeben und einen Denial-of-Service-Zustand zu erzeugen.
Betroffene Betriebssysteme
- Linux
- Sonstiges
- UNIX
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "WebKit ist die Webbrowser-Engine, die von Safari und vielen anderen Apps auf macOS, iOS und Linux verwendet wird.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in WebKit ausnutzen, um beliebigen Code auszuf\u00fchren, vertrauliche Informationen preiszugeben und einen Denial-of-Service-Zustand zu erzeugen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Sonstiges\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-0301 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0301.json" }, { "category": "self", "summary": "WID-SEC-2025-0301 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0301" }, { "category": "external", "summary": "WebKit Security Advisory WSA-2025-0001 vom 2025-02-09", "url": "https://webkitgtk.org/security/WSA-2025-0001.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-4051 vom 2025-02-13", "url": "https://lists.debian.org/debian-lts-announce/2025/02/msg00014.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-5865 vom 2025-02-12", "url": "https://lists.debian.org/debian-security-announce/2025/msg00027.html" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2025-57805565AD vom 2025-02-13", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-57805565ad" }, { "category": "external", "summary": "Fedora Security Advisory FEDORA-2025-3E8ED13BF0 vom 2025-02-13", "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-3e8ed13bf0" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7279-1 vom 2025-02-20", "url": "https://ubuntu.com/security/notices/USN-7279-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0638-1 vom 2025-02-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020399.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0639-1 vom 2025-02-21", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020408.html" }, { "category": "external", "summary": "IGEL Security Notice ISN-2025-06 vom 2025-02-21", "url": "https://kb.igel.com/security-safety/current/isn-2025-06-critical-webkit-vulnerability" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0691-1 vom 2025-02-24", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020424.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0735-1 vom 2025-02-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020451.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1958 vom 2025-03-03", "url": "https://access.redhat.com/errata/RHSA-2025:1958" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1957 vom 2025-03-03", "url": "https://access.redhat.com/errata/RHSA-2025:1957" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1960 vom 2025-03-03", "url": "https://access.redhat.com/errata/RHSA-2025:1960" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:1959 vom 2025-03-03", "url": "https://access.redhat.com/errata/RHSA-2025:1959" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2035 vom 2025-03-03", "url": "https://access.redhat.com/errata/RHSA-2025:2035" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2121 vom 2025-03-03", "url": "https://access.redhat.com/errata/RHSA-2025:2121" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2126 vom 2025-03-03", "url": "https://access.redhat.com/errata/RHSA-2025:2126" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2125 vom 2025-03-03", "url": "https://access.redhat.com/errata/RHSA-2025:2125" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-2034 vom 2025-03-03", "url": "https://linux.oracle.com/errata/ELSA-2025-2034.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-2035 vom 2025-03-03", "url": "https://linux.oracle.com/errata/ELSA-2025-2035.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:2034 vom 2025-03-03", "url": "https://access.redhat.com/errata/RHSA-2025:2034" }, { "category": "external", "summary": "Azul Zulu builds of OpenJDK vom 2025-04-15", "url": "https://docs.azul.com/core/pdfs/april-2025/azul-zulu-ca-release-notes-april-2025-rev1.0.pdf" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2025-2869 vom 2025-05-29", "url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2869.html" } ], "source_lang": "en-US", "title": "WebKit (GTK und WPE): Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-05-29T22:00:00.000+00:00", "generator": { "date": "2025-05-30T09:24:50.256+00:00", "engine": { "name": "BSI-WID", "version": "1.3.12" } }, "id": "WID-SEC-W-2025-0301", "initial_release_date": "2025-02-09T23:00:00.000+00:00", "revision_history": [ { "date": "2025-02-09T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-02-12T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-02-13T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Fedora aufgenommen" }, { "date": "2025-02-20T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-02-23T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE und IGEL aufgenommen" }, { "date": "2025-02-24T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-02-27T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-03-02T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-03-03T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen" }, { "date": "2025-04-15T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates aufgenommen" }, { "date": "2025-05-21T22:00:00.000+00:00", "number": "11", "summary": "Produktzuordnung \u00fcberarbeitet" }, { "date": "2025-05-29T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Amazon aufgenommen" } ], "status": "final", "version": "12" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Azul Zulu", "product": { "name": "Azul Zulu", "product_id": "T034269", "product_identification_helper": { "cpe": "cpe:/a:azul:zulu:-" } } } ], "category": "vendor", "name": "Azul" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Fedora Linux", "product": { "name": "Fedora Linux", "product_id": "74185", "product_identification_helper": { "cpe": "cpe:/o:fedoraproject:fedora:-" } } } ], "category": "vendor", "name": "Fedora" }, { "branches": [ { "category": "product_name", "name": "IGEL OS", "product": { "name": "IGEL OS", "product_id": "T017865", "product_identification_helper": { "cpe": "cpe:/o:igel:os:-" } } } ], "category": "vendor", "name": "IGEL" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c2.44.0", "product": { "name": "Open Source WebKitGTK \u003c2.44.0", "product_id": "T044052" } }, { "category": "product_version", "name": "2.44.0", "product": { "name": "Open Source WebKitGTK 2.44.0", "product_id": "T044052-fixed", "product_identification_helper": { "cpe": "cpe:/a:webkitgtk:webkitgtk:2.44.0" } } }, { "category": "product_version_range", "name": "\u003c2.46.0", "product": { "name": "Open Source WebKitGTK \u003c2.46.0", "product_id": "T044053" } }, { "category": "product_version", "name": "2.46.0", "product": { "name": "Open Source WebKitGTK 2.46.0", "product_id": "T044053-fixed", "product_identification_helper": { "cpe": "cpe:/a:webkitgtk:webkitgtk:2.46.0" } } }, { "category": "product_version_range", "name": "\u003c2.46.5", "product": { "name": "Open Source WebKitGTK \u003c2.46.5", "product_id": "T044054" } }, { "category": "product_version", "name": "2.46.5", "product": { "name": "Open Source WebKitGTK 2.46.5", "product_id": "T044054-fixed", "product_identification_helper": { "cpe": "cpe:/a:webkitgtk:webkitgtk:2.46.5" } } }, { "category": "product_version_range", "name": "\u003c2.46.6", "product": { "name": "Open Source WebKitGTK \u003c2.46.6", "product_id": "T044055" } }, { "category": "product_version", "name": "2.46.6", "product": { "name": "Open Source WebKitGTK 2.46.6", "product_id": "T044055-fixed", "product_identification_helper": { "cpe": "cpe:/a:webkitgtk:webkitgtk:2.46.6" } } } ], "category": "product_name", "name": "WebKitGTK" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-27856", "product_status": { "known_affected": [ "T034269", "67646", "T004914", "74185", "2951", "T002207", "T017865", "T000126", "T044052", "398363", "T044054", "T044053", "T044055" ] }, "release_date": "2025-02-09T23:00:00.000+00:00", "title": "CVE-2024-27856" }, { "cve": "CVE-2024-54543", "product_status": { "known_affected": [ "T034269", "67646", "T004914", "74185", "2951", "T002207", "T017865", "T000126", "T044052", "398363", "T044054", "T044053", "T044055" ] }, "release_date": "2025-02-09T23:00:00.000+00:00", "title": "CVE-2024-54543" }, { "cve": "CVE-2024-54658", "product_status": { "known_affected": [ "T034269", "67646", "T004914", "74185", "2951", "T002207", "T017865", "T000126", "T044052", "398363", "T044054", "T044053", "T044055" ] }, "release_date": "2025-02-09T23:00:00.000+00:00", "title": "CVE-2024-54658" }, { "cve": "CVE-2025-24143", "product_status": { "known_affected": [ "T034269", "67646", "T004914", "74185", "2951", "T002207", "T017865", "T000126", "T044052", "398363", "T044054", "T044053", "T044055" ] }, "release_date": "2025-02-09T23:00:00.000+00:00", "title": "CVE-2025-24143" }, { "cve": "CVE-2025-24150", "product_status": { "known_affected": [ "T034269", "67646", "T004914", "74185", "2951", "T002207", "T017865", "T000126", "T044052", "398363", "T044054", "T044053", "T044055" ] }, "release_date": "2025-02-09T23:00:00.000+00:00", "title": "CVE-2025-24150" }, { "cve": "CVE-2025-24158", "product_status": { "known_affected": [ "T034269", "67646", "T004914", "74185", "2951", "T002207", "T017865", "T000126", "T044052", "398363", "T044054", "T044053", "T044055" ] }, "release_date": "2025-02-09T23:00:00.000+00:00", "title": "CVE-2025-24158" }, { "cve": "CVE-2025-24162", "product_status": { "known_affected": [ "T034269", "67646", "T004914", "74185", "2951", "T002207", "T017865", "T000126", "T044052", "398363", "T044054", "T044053", "T044055" ] }, "release_date": "2025-02-09T23:00:00.000+00:00", "title": "CVE-2025-24162" } ] }
ncsc-2025-0032
Vulnerability from csaf_ncscnl
Published
2025-01-28 10:37
Modified
2025-01-28 10:37
Summary
Kwetsbaarheden verholpen in Apple macOS
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Apple heeft kwetsbaarheden verholpen in macOS Ventura (Specifiek voor versies 13.7.3), Sequoia (Specifiek voor versies 15.3) en Sonoma (Specifiek voor versies 14.7.3).
Interpretaties
De kwetsbaarheden omvatten verschillende problemen, waaronder ongeautoriseerde toegang tot gevoelige gebruikersdata, onjuiste permissies, en kwetsbaarheden die kunnen leiden tot onverwachte applicatie-terminaties. De updates bevatten verbeterde validatietechnieken en extra beveiligingsmaatregelen om de integriteit van gebruikersdata te waarborgen en de algehele beveiliging van de systemen te versterken.
Oplossingen
Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-371
CWE-371
CWE-404
Improper Resource Shutdown or Release
CWE-275
CWE-275
CWE-284
Improper Access Control
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-269
Improper Privilege Management
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Apple heeft kwetsbaarheden verholpen in macOS Ventura (Specifiek voor versies 13.7.3), Sequoia (Specifiek voor versies 15.3) en Sonoma (Specifiek voor versies 14.7.3).", "title": "Feiten" }, { "category": "description", "text": "De kwetsbaarheden omvatten verschillende problemen, waaronder ongeautoriseerde toegang tot gevoelige gebruikersdata, onjuiste permissies, en kwetsbaarheden die kunnen leiden tot onverwachte applicatie-terminaties. De updates bevatten verbeterde validatietechnieken en extra beveiligingsmaatregelen om de integriteit van gebruikersdata te waarborgen en de algehele beveiliging van de systemen te versterken.", "title": "Interpretaties" }, { "category": "description", "text": "Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "CWE-371", "title": "CWE-371" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "CWE-275", "title": "CWE-275" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Improper Privilege Management", "title": "CWE-269" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://support.apple.com/en-us/122074" }, { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://support.apple.com/en-us/122070" }, { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://support.apple.com/en-us/122069" }, { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://support.apple.com/en-us/122068" } ], "title": "Kwetsbaarheden verholpen in Apple macOS", "tracking": { "current_release_date": "2025-01-28T10:37:38.942515Z", "id": "NCSC-2025-0032", "initial_release_date": "2025-01-28T10:37:38.942515Z", "revision_history": [ { "date": "2025-01-28T10:37:38.942515Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "macos_sequoia", "product": { "name": "macos_sequoia", "product_id": "CSAFPID-1741956", "product_identification_helper": { "cpe": "cpe:2.3:a:apple:macos_sequoia:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "macos_sonoma", "product": { "name": "macos_sonoma", "product_id": "CSAFPID-1741955", "product_identification_helper": { "cpe": "cpe:2.3:a:apple:macos_sonoma:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "macos_ventura", "product": { "name": "macos_ventura", "product_id": "CSAFPID-1741954", "product_identification_helper": { "cpe": "cpe:2.3:a:apple:macos_ventura:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "macos", "product": { "name": "macos", "product_id": "CSAFPID-548770", "product_identification_helper": { "cpe": "cpe:2.3:a:apple:macos:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "safari", "product": { "name": "safari", "product_id": "CSAFPID-2733", "product_identification_helper": { "cpe": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "apple" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-44172", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741955", "CSAFPID-1741954" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44172", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44172.json" } ], "title": "CVE-2024-44172" }, { "cve": "CVE-2024-44243", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "other", "text": "Improper Privilege Management", "title": "CWE-269" } ], "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44243", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44243.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955" ] } ], "title": "CVE-2024-44243" }, { "cve": "CVE-2024-54497", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741955", "CSAFPID-1741954" ] }, "references": [ { "category": "self", "summary": "CVE-2024-54497", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54497.json" } ], "title": "CVE-2024-54497" }, { "cve": "CVE-2024-54509", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741955" ] }, "references": [ { "category": "self", "summary": "CVE-2024-54509", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54509.json" } ], "title": "CVE-2024-54509" }, { "cve": "CVE-2025-24085", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24085", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24085.json" } ], "title": "CVE-2025-24085" }, { "cve": "CVE-2025-24086", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955", "CSAFPID-1741954" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24086", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24086.json" } ], "title": "CVE-2025-24086" }, { "cve": "CVE-2025-24087", "cwe": { "id": "CWE-275", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-275", "title": "CWE-275" } ], "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24087", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24087.json" } ], "title": "CVE-2025-24087" }, { "cve": "CVE-2025-24092", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24092", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24092.json" } ], "title": "CVE-2025-24092" }, { "cve": "CVE-2025-24093", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741955", "CSAFPID-1741954" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24093", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24093.json" } ], "title": "CVE-2025-24093" }, { "cve": "CVE-2025-24094", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955", "CSAFPID-1741954" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24094", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24094.json" } ], "title": "CVE-2025-24094" }, { "cve": "CVE-2025-24096", "cwe": { "id": "CWE-371", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-371", "title": "CWE-371" } ], "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24096", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24096.json" } ], "title": "CVE-2025-24096" }, { "cve": "CVE-2025-24100", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955", "CSAFPID-1741954" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24100", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24100.json" } ], "title": "CVE-2025-24100" }, { "cve": "CVE-2025-24101", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24101", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24101.json" } ], "title": "CVE-2025-24101" }, { "cve": "CVE-2025-24102", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955", "CSAFPID-1741954" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24102", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24102.json" } ], "title": "CVE-2025-24102" }, { "cve": "CVE-2025-24103", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955", "CSAFPID-1741954" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24103", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24103.json" } ], "title": "CVE-2025-24103" }, { "cve": "CVE-2025-24106", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955", "CSAFPID-1741954" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24106", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24106.json" } ], "title": "CVE-2025-24106" }, { "cve": "CVE-2025-24107", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24107", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24107.json" } ], "title": "CVE-2025-24107" }, { "cve": "CVE-2025-24108", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24108", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24108.json" } ], "title": "CVE-2025-24108" }, { "cve": "CVE-2025-24109", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955", "CSAFPID-1741954" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24109", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24109.json" } ], "title": "CVE-2025-24109" }, { "cve": "CVE-2025-24112", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24112", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24112.json" } ], "title": "CVE-2025-24112" }, { "cve": "CVE-2025-24113", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-2733", "CSAFPID-1741956" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24113", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24113.json" } ], "title": "CVE-2025-24113" }, { "cve": "CVE-2025-24114", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955", "CSAFPID-1741954" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24114", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24114.json" } ], "title": "CVE-2025-24114" }, { "cve": "CVE-2025-24115", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955", "CSAFPID-1741954" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24115", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24115.json" } ], "title": "CVE-2025-24115" }, { "cve": "CVE-2025-24116", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955", "CSAFPID-1741954" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24116", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24116.json" } ], "title": "CVE-2025-24116" }, { "cve": "CVE-2025-24117", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24117", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24117.json" } ], "title": "CVE-2025-24117" }, { "cve": "CVE-2025-24118", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24118", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24118.json" } ], "title": "CVE-2025-24118" }, { "cve": "CVE-2025-24120", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955", "CSAFPID-1741954" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24120", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24120.json" } ], "title": "CVE-2025-24120" }, { "cve": "CVE-2025-24121", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955", "CSAFPID-1741954" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24121", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24121.json" } ], "title": "CVE-2025-24121" }, { "cve": "CVE-2025-24122", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955", "CSAFPID-1741954" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24122", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24122.json" } ], "title": "CVE-2025-24122" }, { "cve": "CVE-2025-24123", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955", "CSAFPID-1741954" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24123", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24123.json" } ], "title": "CVE-2025-24123" }, { "cve": "CVE-2025-24124", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955", "CSAFPID-1741954" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24124", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24124.json" } ], "title": "CVE-2025-24124" }, { "cve": "CVE-2025-24126", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24126", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24126.json" } ], "title": "CVE-2025-24126" }, { "cve": "CVE-2025-24127", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955", "CSAFPID-1741954" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24127", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24127.json" } ], "title": "CVE-2025-24127" }, { "cve": "CVE-2025-24128", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-2733", "CSAFPID-1741956" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24128", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24128.json" } ], "title": "CVE-2025-24128" }, { "cve": "CVE-2025-24129", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24129", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24129.json" } ], "title": "CVE-2025-24129" }, { "cve": "CVE-2025-24130", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955", "CSAFPID-1741954" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24130", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24130.json" } ], "title": "CVE-2025-24130" }, { "cve": "CVE-2025-24131", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24131", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24131.json" } ], "title": "CVE-2025-24131" }, { "cve": "CVE-2025-24134", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24134", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24134.json" } ], "title": "CVE-2025-24134" }, { "cve": "CVE-2025-24135", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24135", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24135.json" } ], "title": "CVE-2025-24135" }, { "cve": "CVE-2025-24136", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955", "CSAFPID-1741954" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24136", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24136.json" } ], "title": "CVE-2025-24136" }, { "cve": "CVE-2025-24137", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24137", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24137.json" } ], "title": "CVE-2025-24137" }, { "cve": "CVE-2025-24138", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955", "CSAFPID-1741954" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24138", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24138.json" } ], "title": "CVE-2025-24138" }, { "cve": "CVE-2025-24139", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955", "CSAFPID-1741954" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24139", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24139.json" } ], "title": "CVE-2025-24139" }, { "cve": "CVE-2025-24140", "cwe": { "id": "CWE-371", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-371", "title": "CWE-371" } ], "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24140", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24140.json" } ], "title": "CVE-2025-24140" }, { "cve": "CVE-2025-24143", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-2733", "CSAFPID-1741956" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24143", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24143.json" } ], "title": "CVE-2025-24143" }, { "cve": "CVE-2025-24145", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24145", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24145.json" } ], "title": "CVE-2025-24145" }, { "cve": "CVE-2025-24146", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955", "CSAFPID-1741954" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24146", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24146.json" } ], "title": "CVE-2025-24146" }, { "cve": "CVE-2025-24149", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955", "CSAFPID-1741954" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24149", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24149.json" } ], "title": "CVE-2025-24149" }, { "cve": "CVE-2025-24150", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-2733", "CSAFPID-1741956" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24150", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24150.json" } ], "title": "CVE-2025-24150" }, { "cve": "CVE-2025-24151", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955", "CSAFPID-1741954" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24151", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24151.json" } ], "title": "CVE-2025-24151" }, { "cve": "CVE-2025-24152", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "other", "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "title": "CWE-119" } ], "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24152", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24152.json" } ], "title": "CVE-2025-24152" }, { "cve": "CVE-2025-24153", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24153", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24153.json" } ], "title": "CVE-2025-24153" }, { "cve": "CVE-2025-24154", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955", "CSAFPID-1741954" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24154", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24154.json" } ], "title": "CVE-2025-24154" }, { "cve": "CVE-2025-24156", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955", "CSAFPID-1741954" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24156", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24156.json" } ], "title": "CVE-2025-24156" }, { "cve": "CVE-2025-24158", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-2733", "CSAFPID-1741956" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24158", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24158.json" } ], "title": "CVE-2025-24158" }, { "cve": "CVE-2025-24159", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24159", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24159.json" } ], "title": "CVE-2025-24159" }, { "cve": "CVE-2025-24160", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24160", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24160.json" } ], "title": "CVE-2025-24160" }, { "cve": "CVE-2025-24161", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24161", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24161.json" } ], "title": "CVE-2025-24161" }, { "cve": "CVE-2025-24162", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-2733", "CSAFPID-1741956" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24162", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24162.json" } ], "title": "CVE-2025-24162" }, { "cve": "CVE-2025-24163", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24163", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24163.json" } ], "title": "CVE-2025-24163" }, { "cve": "CVE-2025-24166", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955", "CSAFPID-1741954" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24166", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24166.json" } ], "title": "CVE-2025-24166" }, { "cve": "CVE-2025-24169", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-2733", "CSAFPID-1741956" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24169", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24169.json" } ], "title": "CVE-2025-24169" }, { "cve": "CVE-2025-24174", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955", "CSAFPID-1741954" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24174", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24174.json" } ], "title": "CVE-2025-24174" }, { "cve": "CVE-2025-24176", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956", "CSAFPID-1741955", "CSAFPID-1741954" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24176", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24176.json" } ], "title": "CVE-2025-24176" }, { "cve": "CVE-2025-24177", "product_status": { "known_affected": [ "CSAFPID-548770", "CSAFPID-1741956" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24177", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24177.json" } ], "title": "CVE-2025-24177" } ] }
ncsc-2025-0034
Vulnerability from csaf_ncscnl
Published
2025-01-28 11:31
Modified
2025-01-28 11:31
Summary
Kwetsbaarheden verholpen in Apple iPadOS en iOS
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Apple heeft kwetsbaarheden verholpen in iOS en iPadOS.
Interpretaties
De kwetsbaarheden omvatten onder andere problemen met geheugenbeheer, invoervalidatie, en de verwerking van webinhoud, die konden leiden tot ongeautoriseerde toegang, executie van willekeurige code en Denial-of-Service aanvallen. Apple geeft aan dat CVE-2025-24085, die kan worden misbruikt om verhoogde rechten te verkrijgen op het systeem, mogelijkerwijze actief is misbruikt.
Oplossingen
Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-287
Improper Authentication
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Apple heeft kwetsbaarheden verholpen in iOS en iPadOS.", "title": "Feiten" }, { "category": "description", "text": "De kwetsbaarheden omvatten onder andere problemen met geheugenbeheer, invoervalidatie, en de verwerking van webinhoud, die konden leiden tot ongeautoriseerde toegang, executie van willekeurige code en Denial-of-Service aanvallen. Apple geeft aan dat CVE-2025-24085, die kan worden misbruikt om verhoogde rechten te verkrijgen op het systeem, mogelijkerwijze actief is misbruikt.", "title": "Interpretaties" }, { "category": "description", "text": "Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Improper Authentication", "title": "CWE-287" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://support.apple.com/en-us/122066" }, { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://support.apple.com/en-us/122067" } ], "title": "Kwetsbaarheden verholpen in Apple iPadOS en iOS", "tracking": { "current_release_date": "2025-01-28T11:31:14.861619Z", "id": "NCSC-2025-0034", "initial_release_date": "2025-01-28T11:31:14.861619Z", "revision_history": [ { "date": "2025-01-28T11:31:14.861619Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "ios", "product": { "name": "ios", "product_id": "CSAFPID-548768", "product_identification_helper": { "cpe": "cpe:2.3:a:apple:ios:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ipados", "product": { "name": "ipados", "product_id": "CSAFPID-1691048", "product_identification_helper": { "cpe": "cpe:2.3:a:apple:ipados:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ios_and_ipados", "product": { "name": "ios_and_ipados", "product_id": "CSAFPID-551327", "product_identification_helper": { "cpe": "cpe:2.3:a:apple:ios_and_ipados:*:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "apple" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-9956", "product_status": { "known_affected": [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327" ] }, "references": [ { "category": "self", "summary": "CVE-2024-9956", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-9956.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327" ] } ], "title": "CVE-2024-9956" }, { "cve": "CVE-2024-54478", "product_status": { "known_affected": [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327" ] }, "references": [ { "category": "self", "summary": "CVE-2024-54478", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54478.json" } ], "title": "CVE-2024-54478" }, { "cve": "CVE-2024-54497", "product_status": { "known_affected": [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327" ] }, "references": [ { "category": "self", "summary": "CVE-2024-54497", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54497.json" } ], "title": "CVE-2024-54497" }, { "cve": "CVE-2025-24085", "product_status": { "known_affected": [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24085", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24085.json" } ], "title": "CVE-2025-24085" }, { "cve": "CVE-2025-24086", "product_status": { "known_affected": [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24086", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24086.json" } ], "title": "CVE-2025-24086" }, { "cve": "CVE-2025-24102", "product_status": { "known_affected": [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24102", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24102.json" } ], "title": "CVE-2025-24102" }, { "cve": "CVE-2025-24104", "product_status": { "known_affected": [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24104", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24104.json" } ], "title": "CVE-2025-24104" }, { "cve": "CVE-2025-24107", "product_status": { "known_affected": [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24107", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24107.json" } ], "title": "CVE-2025-24107" }, { "cve": "CVE-2025-24113", "product_status": { "known_affected": [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24113", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24113.json" } ], "title": "CVE-2025-24113" }, { "cve": "CVE-2025-24117", "product_status": { "known_affected": [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24117", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24117.json" } ], "title": "CVE-2025-24117" }, { "cve": "CVE-2025-24118", "product_status": { "known_affected": [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24118", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24118.json" } ], "title": "CVE-2025-24118" }, { "cve": "CVE-2025-24123", "product_status": { "known_affected": [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24123", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24123.json" } ], "title": "CVE-2025-24123" }, { "cve": "CVE-2025-24124", "product_status": { "known_affected": [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24124", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24124.json" } ], "title": "CVE-2025-24124" }, { "cve": "CVE-2025-24126", "product_status": { "known_affected": [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24126", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24126.json" } ], "title": "CVE-2025-24126" }, { "cve": "CVE-2025-24127", "product_status": { "known_affected": [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24127", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24127.json" } ], "title": "CVE-2025-24127" }, { "cve": "CVE-2025-24128", "product_status": { "known_affected": [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24128", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24128.json" } ], "title": "CVE-2025-24128" }, { "cve": "CVE-2025-24129", "product_status": { "known_affected": [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24129", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24129.json" } ], "title": "CVE-2025-24129" }, { "cve": "CVE-2025-24131", "product_status": { "known_affected": [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24131", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24131.json" } ], "title": "CVE-2025-24131" }, { "cve": "CVE-2025-24137", "product_status": { "known_affected": [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24137", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24137.json" } ], "title": "CVE-2025-24137" }, { "cve": "CVE-2025-24141", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "other", "text": "Improper Authentication", "title": "CWE-287" } ], "product_status": { "known_affected": [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24141", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24141.json" } ], "title": "CVE-2025-24141" }, { "cve": "CVE-2025-24143", "product_status": { "known_affected": [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24143", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24143.json" } ], "title": "CVE-2025-24143" }, { "cve": "CVE-2025-24145", "product_status": { "known_affected": [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24145", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24145.json" } ], "title": "CVE-2025-24145" }, { "cve": "CVE-2025-24149", "product_status": { "known_affected": [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24149", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24149.json" } ], "title": "CVE-2025-24149" }, { "cve": "CVE-2025-24150", "product_status": { "known_affected": [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24150", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24150.json" } ], "title": "CVE-2025-24150" }, { "cve": "CVE-2025-24154", "product_status": { "known_affected": [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24154", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24154.json" } ], "title": "CVE-2025-24154" }, { "cve": "CVE-2025-24158", "product_status": { "known_affected": [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24158", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24158.json" } ], "title": "CVE-2025-24158" }, { "cve": "CVE-2025-24159", "product_status": { "known_affected": [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24159", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24159.json" } ], "title": "CVE-2025-24159" }, { "cve": "CVE-2025-24160", "product_status": { "known_affected": [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24160", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24160.json" } ], "title": "CVE-2025-24160" }, { "cve": "CVE-2025-24161", "product_status": { "known_affected": [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24161", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24161.json" } ], "title": "CVE-2025-24161" }, { "cve": "CVE-2025-24162", "product_status": { "known_affected": [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24162", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24162.json" } ], "title": "CVE-2025-24162" }, { "cve": "CVE-2025-24163", "product_status": { "known_affected": [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24163", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24163.json" } ], "title": "CVE-2025-24163" }, { "cve": "CVE-2025-24166", "product_status": { "known_affected": [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24166", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24166.json" } ], "title": "CVE-2025-24166" }, { "cve": "CVE-2025-24177", "product_status": { "known_affected": [ "CSAFPID-548768", "CSAFPID-1691048", "CSAFPID-551327" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24177", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24177.json" } ], "title": "CVE-2025-24177" } ] }
fkie_cve-2025-24143
Vulnerability from fkie_nvd
Published
2025-01-27 22:15
Modified
2025-02-04 22:15
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Summary
The issue was addressed with improved access restrictions to the file system. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, visionOS 2.3. A maliciously crafted webpage may be able to fingerprint the user.
References
▶ | URL | Tags | |
---|---|---|---|
product-security@apple.com | https://support.apple.com/en-us/122066 | Release Notes | |
product-security@apple.com | https://support.apple.com/en-us/122068 | Release Notes | |
product-security@apple.com | https://support.apple.com/en-us/122073 | Release Notes | |
product-security@apple.com | https://support.apple.com/en-us/122074 | Release Notes |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "matchCriteriaId": "0384B3A1-9447-4020-A798-38CB2348F67B", "versionEndExcluding": "18.3", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B7F80FC-EB0A-4B78-8CB7-18E5F162CD6A", "versionEndExcluding": "18.3", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "38BA63B3-CC2C-4E63-AE2C-B8DB08B5E89B", "versionEndExcluding": "15.3", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", "matchCriteriaId": "F91BF3D5-D8E5-437C-8301-C9F22AAFB8BD", "versionEndExcluding": "2.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved access restrictions to the file system. This issue is fixed in macOS Sequoia 15.3, Safari 18.3, iOS 18.3 and iPadOS 18.3, visionOS 2.3. A maliciously crafted webpage may be able to fingerprint the user." }, { "lang": "es", "value": "El problema se solucion\u00f3 mejorando las restricciones de acceso al archivo sistema. Este problema se solucion\u00f3 en macOS Sequoia 15.3, Safari 18.3, iOS 18.3 y iPadOS 18.3, visionOS 2.3. Una p\u00e1gina web malintencionada manipulado puede tomar la huella digital del usuario." } ], "id": "CVE-2025-24143", "lastModified": "2025-02-04T22:15:42.697", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2025-01-27T22:15:18.893", "references": [ { "source": "product-security@apple.com", "tags": [ "Release Notes" ], "url": "https://support.apple.com/en-us/122066" }, { "source": "product-security@apple.com", "tags": [ "Release Notes" ], "url": "https://support.apple.com/en-us/122068" }, { "source": "product-security@apple.com", "tags": [ "Release Notes" ], "url": "https://support.apple.com/en-us/122073" }, { "source": "product-security@apple.com", "tags": [ "Release Notes" ], "url": "https://support.apple.com/en-us/122074" } ], "sourceIdentifier": "product-security@apple.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-862" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…