<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for webkit2gtk3</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2021:1101-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2021-08-09T21:19:52Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-08-09T21:19:52Z</InitialReleaseDate>
    <CurrentReleaseDate>2021-08-09T21:19:52Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for webkit2gtk3</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for webkit2gtk3 fixes the following issues:

- Update to version 2.32.3:
- CVE-2021-21775: Fixed a use-after-free vulnerability in the way certain events are processed for ImageLoader objects. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability. (bsc#1188697)
- CVE-2021-21779: Fixed a use-after-free vulnerability in the way that WebKit GraphicsContext handles certain events. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability. (bsc#1188697)
- CVE-2021-30663: An integer overflow was addressed with improved input validation. (bsc#1188697)
- CVE-2021-30665: A memory corruption issue was addressed with improved state management. (bsc#1188697)
- CVE-2021-30689: A logic issue was addressed with improved state management. (bsc#1188697)
- CVE-2021-30720: A logic issue was addressed with improved restrictions. (bsc#1188697)
- CVE-2021-30734: Multiple memory corruption issues were addressed with improved memory handling. (bsc#1188697)
- CVE-2021-30744: A cross-origin issue with iframe elements was addressed with improved tracking of security origins. (bsc#1188697)
- CVE-2021-30749: Multiple memory corruption issues were addressed with improved memory handling. (bsc#1188697)
- CVE-2021-30758: A type confusion issue was addressed with improved state handling. (bsc#1188697)
- CVE-2021-30795: A use after free issue was addressed with improved memory management. (bsc#1188697)
- CVE-2021-30797: This issue was addressed with improved checks. (bsc#1188697)
- CVE-2021-30799: Multiple memory corruption issues were addressed with improved memory handling. (bsc#1188697)

This update was imported from the SUSE:SLE-15-SP2:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2021-1101</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/</URL>
      <Description>E-Mail link for openSUSE-SU-2021:1101-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1188697</URL>
      <Description>SUSE Bug 1188697</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-21775/</URL>
      <Description>SUSE CVE CVE-2021-21775 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-21779/</URL>
      <Description>SUSE CVE CVE-2021-21779 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-30663/</URL>
      <Description>SUSE CVE CVE-2021-30663 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-30665/</URL>
      <Description>SUSE CVE CVE-2021-30665 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-30689/</URL>
      <Description>SUSE CVE CVE-2021-30689 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-30720/</URL>
      <Description>SUSE CVE CVE-2021-30720 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-30734/</URL>
      <Description>SUSE CVE CVE-2021-30734 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-30744/</URL>
      <Description>SUSE CVE CVE-2021-30744 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-30749/</URL>
      <Description>SUSE CVE CVE-2021-30749 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-30758/</URL>
      <Description>SUSE CVE CVE-2021-30758 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-30795/</URL>
      <Description>SUSE CVE CVE-2021-30795 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-30797/</URL>
      <Description>SUSE CVE CVE-2021-30797 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-30799/</URL>
      <Description>SUSE CVE CVE-2021-30799 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.2">
      <Branch Type="Product Name" Name="openSUSE Leap 15.2">
        <FullProductName ProductID="openSUSE Leap 15.2" CPE="cpe:/o:opensuse:leap:15.2">openSUSE Leap 15.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-4_0-18-2.32.3-lp152.2.16.1">
      <FullProductName ProductID="libjavascriptcoregtk-4_0-18-2.32.3-lp152.2.16.1">libjavascriptcoregtk-4_0-18-2.32.3-lp152.2.16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-4_0-18-32bit-2.32.3-lp152.2.16.1">
      <FullProductName ProductID="libjavascriptcoregtk-4_0-18-32bit-2.32.3-lp152.2.16.1">libjavascriptcoregtk-4_0-18-32bit-2.32.3-lp152.2.16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk-4_0-37-2.32.3-lp152.2.16.1">
      <FullProductName ProductID="libwebkit2gtk-4_0-37-2.32.3-lp152.2.16.1">libwebkit2gtk-4_0-37-2.32.3-lp152.2.16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk-4_0-37-32bit-2.32.3-lp152.2.16.1">
      <FullProductName ProductID="libwebkit2gtk-4_0-37-32bit-2.32.3-lp152.2.16.1">libwebkit2gtk-4_0-37-32bit-2.32.3-lp152.2.16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk3-lang-2.32.3-lp152.2.16.1">
      <FullProductName ProductID="libwebkit2gtk3-lang-2.32.3-lp152.2.16.1">libwebkit2gtk3-lang-2.32.3-lp152.2.16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-JavaScriptCore-4_0-2.32.3-lp152.2.16.1">
      <FullProductName ProductID="typelib-1_0-JavaScriptCore-4_0-2.32.3-lp152.2.16.1">typelib-1_0-JavaScriptCore-4_0-2.32.3-lp152.2.16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit2-4_0-2.32.3-lp152.2.16.1">
      <FullProductName ProductID="typelib-1_0-WebKit2-4_0-2.32.3-lp152.2.16.1">typelib-1_0-WebKit2-4_0-2.32.3-lp152.2.16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-lp152.2.16.1">
      <FullProductName ProductID="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-lp152.2.16.1">typelib-1_0-WebKit2WebExtension-4_0-2.32.3-lp152.2.16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit-jsc-4-2.32.3-lp152.2.16.1">
      <FullProductName ProductID="webkit-jsc-4-2.32.3-lp152.2.16.1">webkit-jsc-4-2.32.3-lp152.2.16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk-4_0-injected-bundles-2.32.3-lp152.2.16.1">
      <FullProductName ProductID="webkit2gtk-4_0-injected-bundles-2.32.3-lp152.2.16.1">webkit2gtk-4_0-injected-bundles-2.32.3-lp152.2.16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk3-devel-2.32.3-lp152.2.16.1">
      <FullProductName ProductID="webkit2gtk3-devel-2.32.3-lp152.2.16.1">webkit2gtk3-devel-2.32.3-lp152.2.16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk3-minibrowser-2.32.3-lp152.2.16.1">
      <FullProductName ProductID="webkit2gtk3-minibrowser-2.32.3-lp152.2.16.1">webkit2gtk3-minibrowser-2.32.3-lp152.2.16.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libjavascriptcoregtk-4_0-18-2.32.3-lp152.2.16.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.3-lp152.2.16.1">libjavascriptcoregtk-4_0-18-2.32.3-lp152.2.16.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libjavascriptcoregtk-4_0-18-32bit-2.32.3-lp152.2.16.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.3-lp152.2.16.1">libjavascriptcoregtk-4_0-18-32bit-2.32.3-lp152.2.16.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk-4_0-37-2.32.3-lp152.2.16.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.3-lp152.2.16.1">libwebkit2gtk-4_0-37-2.32.3-lp152.2.16.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk-4_0-37-32bit-2.32.3-lp152.2.16.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.3-lp152.2.16.1">libwebkit2gtk-4_0-37-32bit-2.32.3-lp152.2.16.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk3-lang-2.32.3-lp152.2.16.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.3-lp152.2.16.1">libwebkit2gtk3-lang-2.32.3-lp152.2.16.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-JavaScriptCore-4_0-2.32.3-lp152.2.16.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.3-lp152.2.16.1">typelib-1_0-JavaScriptCore-4_0-2.32.3-lp152.2.16.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-WebKit2-4_0-2.32.3-lp152.2.16.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.3-lp152.2.16.1">typelib-1_0-WebKit2-4_0-2.32.3-lp152.2.16.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-WebKit2WebExtension-4_0-2.32.3-lp152.2.16.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.3-lp152.2.16.1">typelib-1_0-WebKit2WebExtension-4_0-2.32.3-lp152.2.16.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit-jsc-4-2.32.3-lp152.2.16.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:webkit-jsc-4-2.32.3-lp152.2.16.1">webkit-jsc-4-2.32.3-lp152.2.16.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk-4_0-injected-bundles-2.32.3-lp152.2.16.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.3-lp152.2.16.1">webkit2gtk-4_0-injected-bundles-2.32.3-lp152.2.16.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk3-devel-2.32.3-lp152.2.16.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:webkit2gtk3-devel-2.32.3-lp152.2.16.1">webkit2gtk3-devel-2.32.3-lp152.2.16.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk3-minibrowser-2.32.3-lp152.2.16.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.3-lp152.2.16.1">webkit2gtk3-minibrowser-2.32.3-lp152.2.16.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability exists in the way certain events are processed for ImageLoader objects of Webkit WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. In order to trigger the vulnerability, a victim must be tricked into visiting a malicious webpage.</Note>
    </Notes>
    <CVE>CVE-2021-21775</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit-jsc-4-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-devel-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.3-lp152.2.16.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-21775.html</URL>
        <Description>CVE-2021-21775</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188697</URL>
        <Description>SUSE Bug 1188697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability exists in the way Webkit's GraphicsContext handles certain events in WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability.</Note>
    </Notes>
    <CVE>CVE-2021-21779</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit-jsc-4-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-devel-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.3-lp152.2.16.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-21779.html</URL>
        <Description>CVE-2021-21779</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188293</URL>
        <Description>SUSE Bug 1188293</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188697</URL>
        <Description>SUSE Bug 1188697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An integer overflow was addressed with improved input validation. This issue is fixed in iOS 14.5.1 and iPadOS 14.5.1, tvOS 14.6, iOS 12.5.3, Safari 14.1.1, macOS Big Sur 11.3.1. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2021-30663</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit-jsc-4-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-devel-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.3-lp152.2.16.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-30663.html</URL>
        <Description>CVE-2021-30663</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188697</URL>
        <Description>SUSE Bug 1188697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 7.4.1, iOS 14.5.1 and iPadOS 14.5.1, tvOS 14.6, iOS 12.5.3, macOS Big Sur 11.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..</Note>
    </Notes>
    <CVE>CVE-2021-30665</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit-jsc-4-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-devel-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.3-lp152.2.16.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-30665.html</URL>
        <Description>CVE-2021-30665</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188697</URL>
        <Description>SUSE Bug 1188697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A logic issue was addressed with improved state management. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to universal cross site scripting.</Note>
    </Notes>
    <CVE>CVE-2021-30689</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit-jsc-4-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-devel-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.3-lp152.2.16.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-30689.html</URL>
        <Description>CVE-2021-30689</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188697</URL>
        <Description>SUSE Bug 1188697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious website may be able to access restricted ports on arbitrary servers.</Note>
    </Notes>
    <CVE>CVE-2021-30720</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit-jsc-4-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-devel-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.3-lp152.2.16.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-30720.html</URL>
        <Description>CVE-2021-30720</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188697</URL>
        <Description>SUSE Bug 1188697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2021-30734</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit-jsc-4-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-devel-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.3-lp152.2.16.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-30734.html</URL>
        <Description>CVE-2021-30734</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188697</URL>
        <Description>SUSE Bug 1188697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Description: A cross-origin issue with iframe elements was addressed with improved tracking of security origins. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to universal cross site scripting.</Note>
    </Notes>
    <CVE>CVE-2021-30744</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit-jsc-4-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-devel-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.3-lp152.2.16.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-30744.html</URL>
        <Description>CVE-2021-30744</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188697</URL>
        <Description>SUSE Bug 1188697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2021-30749</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit-jsc-4-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-devel-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.3-lp152.2.16.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-30749.html</URL>
        <Description>CVE-2021-30749</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188697</URL>
        <Description>SUSE Bug 1188697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2021-30758</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit-jsc-4-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-devel-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.3-lp152.2.16.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-30758.html</URL>
        <Description>CVE-2021-30758</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188697</URL>
        <Description>SUSE Bug 1188697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2021-30795</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit-jsc-4-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-devel-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.3-lp152.2.16.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-30795.html</URL>
        <Description>CVE-2021-30795</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188697</URL>
        <Description>SUSE Bug 1188697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">This issue was addressed with improved checks. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to code execution.</Note>
    </Notes>
    <CVE>CVE-2021-30797</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit-jsc-4-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-devel-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.3-lp152.2.16.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-30797.html</URL>
        <Description>CVE-2021-30797</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188697</URL>
        <Description>SUSE Bug 1188697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2021-30799</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit-jsc-4-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-devel-2.32.3-lp152.2.16.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.3-lp152.2.16.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DYJ44GRLS3QYOXTONYQG6SHUD22SUDIB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-30799.html</URL>
        <Description>CVE-2021-30799</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188697</URL>
        <Description>SUSE Bug 1188697</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
