<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for webkit2gtk3</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2022:0705-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2022-03-04T06:45:18Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2022-03-04T06:45:18Z</InitialReleaseDate>
    <CurrentReleaseDate>2022-03-04T06:45:18Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for webkit2gtk3</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for webkit2gtk3 fixes the following issues:

Update to version 2.34.6 (bsc#1196133):

- CVE-2022-22620: Processing maliciously crafted web content may have lead to arbitrary code execution.

Update to version 2.34.5 (bsc#1195735):

- CVE-2022-22589: A validation issue was addressed with improved input sanitization.
- CVE-2022-22590: A use after free issue was addressed with improved memory management.
- CVE-2022-22592: A logic issue was addressed with improved state management.

Update to version 2.34.4 (bsc#1195064):

- CVE-2021-30934: A buffer overflow issue was addressed with improved memory handling.
- CVE-2021-30936: A use after free issue was addressed with improved memory management.
- CVE-2021-30951: A use after free issue was addressed with improved memory management.
- CVE-2021-30952: An integer overflow was addressed with improved input validation.
- CVE-2021-30953: An out-of-bounds read was addressed with improved bounds checking.
- CVE-2021-30954: A type confusion issue was addressed with improved memory handling.
- CVE-2021-30984: A race condition was addressed with improved state handling.
- CVE-2022-22594: A cross-origin issue in the IndexDB API was addressed with improved input validation.

The following CVEs were addressed in a previous update:

- CVE-2021-45481: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create.
- CVE-2021-45482: A use-after-free in WebCore::ContainerNode::firstChild.
- CVE-2021-45483: A use-after-free in WebCore::Frame::page.
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-SLE-15.3-2022-705,openSUSE-SLE-15.4-2022-705</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/</URL>
      <Description>E-Mail link for openSUSE-SU-2022:0705-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1195064</URL>
      <Description>SUSE Bug 1195064</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1195735</URL>
      <Description>SUSE Bug 1195735</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1196133</URL>
      <Description>SUSE Bug 1196133</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-30934/</URL>
      <Description>SUSE CVE CVE-2021-30934 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-30936/</URL>
      <Description>SUSE CVE CVE-2021-30936 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-30951/</URL>
      <Description>SUSE CVE CVE-2021-30951 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-30952/</URL>
      <Description>SUSE CVE CVE-2021-30952 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-30953/</URL>
      <Description>SUSE CVE CVE-2021-30953 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-30954/</URL>
      <Description>SUSE CVE CVE-2021-30954 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-30984/</URL>
      <Description>SUSE CVE CVE-2021-30984 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-45481/</URL>
      <Description>SUSE CVE CVE-2021-45481 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-45482/</URL>
      <Description>SUSE CVE CVE-2021-45482 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-45483/</URL>
      <Description>SUSE CVE CVE-2021-45483 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-22589/</URL>
      <Description>SUSE CVE CVE-2022-22589 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-22590/</URL>
      <Description>SUSE CVE CVE-2022-22590 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-22592/</URL>
      <Description>SUSE CVE CVE-2022-22592 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-22620/</URL>
      <Description>SUSE CVE CVE-2022-22620 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.3">
      <Branch Type="Product Name" Name="openSUSE Leap 15.3">
        <FullProductName ProductID="openSUSE Leap 15.3" CPE="cpe:/o:opensuse:leap:15.3">openSUSE Leap 15.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-4_0-18-2.34.6-29.1">
      <FullProductName ProductID="libjavascriptcoregtk-4_0-18-2.34.6-29.1">libjavascriptcoregtk-4_0-18-2.34.6-29.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1">
      <FullProductName ProductID="libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1">libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk-4_0-37-2.34.6-29.1">
      <FullProductName ProductID="libwebkit2gtk-4_0-37-2.34.6-29.1">libwebkit2gtk-4_0-37-2.34.6-29.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk-4_0-37-32bit-2.34.6-29.1">
      <FullProductName ProductID="libwebkit2gtk-4_0-37-32bit-2.34.6-29.1">libwebkit2gtk-4_0-37-32bit-2.34.6-29.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk3-lang-2.34.6-29.1">
      <FullProductName ProductID="libwebkit2gtk3-lang-2.34.6-29.1">libwebkit2gtk3-lang-2.34.6-29.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1">
      <FullProductName ProductID="typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1">typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit2-4_0-2.34.6-29.1">
      <FullProductName ProductID="typelib-1_0-WebKit2-4_0-2.34.6-29.1">typelib-1_0-WebKit2-4_0-2.34.6-29.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1">
      <FullProductName ProductID="typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1">typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit-jsc-4-2.34.6-29.1">
      <FullProductName ProductID="webkit-jsc-4-2.34.6-29.1">webkit-jsc-4-2.34.6-29.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk-4_0-injected-bundles-2.34.6-29.1">
      <FullProductName ProductID="webkit2gtk-4_0-injected-bundles-2.34.6-29.1">webkit2gtk-4_0-injected-bundles-2.34.6-29.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk3-devel-2.34.6-29.1">
      <FullProductName ProductID="webkit2gtk3-devel-2.34.6-29.1">webkit2gtk3-devel-2.34.6-29.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk3-minibrowser-2.34.6-29.1">
      <FullProductName ProductID="webkit2gtk3-minibrowser-2.34.6-29.1">webkit2gtk3-minibrowser-2.34.6-29.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libjavascriptcoregtk-4_0-18-2.34.6-29.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1">libjavascriptcoregtk-4_0-18-2.34.6-29.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1">libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk-4_0-37-2.34.6-29.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1">libwebkit2gtk-4_0-37-2.34.6-29.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk-4_0-37-32bit-2.34.6-29.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1">libwebkit2gtk-4_0-37-32bit-2.34.6-29.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk3-lang-2.34.6-29.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1">libwebkit2gtk3-lang-2.34.6-29.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1">typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-WebKit2-4_0-2.34.6-29.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1">typelib-1_0-WebKit2-4_0-2.34.6-29.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1">typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit-jsc-4-2.34.6-29.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1">webkit-jsc-4-2.34.6-29.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk-4_0-injected-bundles-2.34.6-29.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1">webkit2gtk-4_0-injected-bundles-2.34.6-29.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk3-devel-2.34.6-29.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1">webkit2gtk3-devel-2.34.6-29.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk3-minibrowser-2.34.6-29.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1">webkit2gtk3-minibrowser-2.34.6-29.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A buffer overflow issue was addressed with improved memory handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2021-30934</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-30934.html</URL>
        <Description>CVE-2021-30934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1195064</URL>
        <Description>SUSE Bug 1195064</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1196393</URL>
        <Description>SUSE Bug 1196393</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2021-30936</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-30936.html</URL>
        <Description>CVE-2021-30936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1195064</URL>
        <Description>SUSE Bug 1195064</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2021-30951</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-30951.html</URL>
        <Description>CVE-2021-30951</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1195064</URL>
        <Description>SUSE Bug 1195064</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An integer overflow was addressed with improved input validation. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2021-30952</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-30952.html</URL>
        <Description>CVE-2021-30952</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1195064</URL>
        <Description>SUSE Bug 1195064</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2021-30953</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-30953.html</URL>
        <Description>CVE-2021-30953</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1195064</URL>
        <Description>SUSE Bug 1195064</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A type confusion issue was addressed with improved memory handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2021-30954</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-30954.html</URL>
        <Description>CVE-2021-30954</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1195064</URL>
        <Description>SUSE Bug 1195064</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A race condition was addressed with improved state handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2021-30984</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-30984.html</URL>
        <Description>CVE-2021-30984</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1195064</URL>
        <Description>SUSE Bug 1195064</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In WebKitGTK before 2.32.4, there is incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create, leading to a segmentation violation and application crash, a different vulnerability than CVE-2021-30889.</Note>
    </Notes>
    <CVE>CVE-2021-45481</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-45481.html</URL>
        <Description>CVE-2021-45481</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1194138</URL>
        <Description>SUSE Bug 1194138</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1195064</URL>
        <Description>SUSE Bug 1195064</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In WebKitGTK before 2.32.4, there is a use-after-free in WebCore::ContainerNode::firstChild, a different vulnerability than CVE-2021-30889.</Note>
    </Notes>
    <CVE>CVE-2021-45482</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-45482.html</URL>
        <Description>CVE-2021-45482</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1194136</URL>
        <Description>SUSE Bug 1194136</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1195064</URL>
        <Description>SUSE Bug 1195064</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In WebKitGTK before 2.32.4, there is a use-after-free in WebCore::Frame::page, a different vulnerability than CVE-2021-30889.</Note>
    </Notes>
    <CVE>CVE-2021-45483</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-45483.html</URL>
        <Description>CVE-2021-45483</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1194135</URL>
        <Description>SUSE Bug 1194135</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1195064</URL>
        <Description>SUSE Bug 1195064</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A validation issue was addressed with improved input sanitization. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. Processing a maliciously crafted mail message may lead to running arbitrary javascript.</Note>
    </Notes>
    <CVE>CVE-2022-22589</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-22589.html</URL>
        <Description>CVE-2022-22589</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1195735</URL>
        <Description>SUSE Bug 1195735</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free issue was addressed with improved memory management. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2022-22590</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-22590.html</URL>
        <Description>CVE-2022-22590</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1195735</URL>
        <Description>SUSE Bug 1195735</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A logic issue was addressed with improved state management. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. Processing maliciously crafted web content may prevent Content Security Policy from being enforced.</Note>
    </Notes>
    <CVE>CVE-2022-22592</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-22592.html</URL>
        <Description>CVE-2022-22592</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1195735</URL>
        <Description>SUSE Bug 1195735</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.2.1, iOS 15.3.1 and iPadOS 15.3.1, Safari 15.3 (v. 16612.4.9.1.8 and 15612.4.9.1.8). Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..</Note>
    </Notes>
    <CVE>CVE-2022-22620</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1</ProductID>
        <ProductID>openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-22620.html</URL>
        <Description>CVE-2022-22620</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1196133</URL>
        <Description>SUSE Bug 1196133</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
