<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for webkit2gtk3</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2019:1137-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-05-03T09:29:28Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-05-03T09:29:28Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-05-03T09:29:28Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for webkit2gtk3</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for webkit2gtk3 to version 2.24.1 fixes the following issues:

Security issues fixed:

- CVE-2019-6201, CVE-2019-6251, CVE-2019-7285, CVE-2019-7292, CVE-2019-8503, CVE-2019-8506,
  CVE-2019-8515, CVE-2019-8518, CVE-2019-8523, CVE-2019-8524, CVE-2019-8535, CVE-2019-8536,
  CVE-2019-8544, CVE-2019-8551, CVE-2019-8558, CVE-2019-8559, CVE-2019-8563, CVE-2019-11070
  (bsc#1132256).
 </Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2019-1137,SUSE-SLE-Module-Basesystem-15-2019-1137,SUSE-SLE-Module-Desktop-Applications-15-2019-1137,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1137</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191137-1/</URL>
      <Description>Link for SUSE-SU-2019:1137-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2019-May/005420.html</URL>
      <Description>E-Mail link for SUSE-SU-2019:1137-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1132256</URL>
      <Description>SUSE Bug 1132256</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11070/</URL>
      <Description>SUSE CVE CVE-2019-11070 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-6201/</URL>
      <Description>SUSE CVE CVE-2019-6201 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-6251/</URL>
      <Description>SUSE CVE CVE-2019-6251 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-7285/</URL>
      <Description>SUSE CVE CVE-2019-7285 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-7292/</URL>
      <Description>SUSE CVE CVE-2019-7292 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8503/</URL>
      <Description>SUSE CVE CVE-2019-8503 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8506/</URL>
      <Description>SUSE CVE CVE-2019-8506 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8515/</URL>
      <Description>SUSE CVE CVE-2019-8515 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8518/</URL>
      <Description>SUSE CVE CVE-2019-8518 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8523/</URL>
      <Description>SUSE CVE CVE-2019-8523 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8524/</URL>
      <Description>SUSE CVE CVE-2019-8524 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8535/</URL>
      <Description>SUSE CVE CVE-2019-8535 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8536/</URL>
      <Description>SUSE CVE CVE-2019-8536 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8544/</URL>
      <Description>SUSE CVE CVE-2019-8544 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8551/</URL>
      <Description>SUSE CVE CVE-2019-8551 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8558/</URL>
      <Description>SUSE CVE CVE-2019-8558 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8559/</URL>
      <Description>SUSE CVE CVE-2019-8559 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8563/</URL>
      <Description>SUSE CVE CVE-2019-8563 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Basesystem 15">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Basesystem 15">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15" CPE="cpe:/o:suse:sle-module-basesystem:15">SUSE Linux Enterprise Module for Basesystem 15</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Desktop Applications 15">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Desktop Applications 15">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Desktop Applications 15" CPE="cpe:/o:suse:sle-module-desktop-applications:15">SUSE Linux Enterprise Module for Desktop Applications 15</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-4_0-18-2.24.1-3.24.1">
      <FullProductName ProductID="libjavascriptcoregtk-4_0-18-2.24.1-3.24.1">libjavascriptcoregtk-4_0-18-2.24.1-3.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-4_0-18-32bit-2.24.1-3.24.1">
      <FullProductName ProductID="libjavascriptcoregtk-4_0-18-32bit-2.24.1-3.24.1">libjavascriptcoregtk-4_0-18-32bit-2.24.1-3.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-4_0-18-64bit-2.24.1-3.24.1">
      <FullProductName ProductID="libjavascriptcoregtk-4_0-18-64bit-2.24.1-3.24.1">libjavascriptcoregtk-4_0-18-64bit-2.24.1-3.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk-4_0-37-2.24.1-3.24.1">
      <FullProductName ProductID="libwebkit2gtk-4_0-37-2.24.1-3.24.1">libwebkit2gtk-4_0-37-2.24.1-3.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk-4_0-37-32bit-2.24.1-3.24.1">
      <FullProductName ProductID="libwebkit2gtk-4_0-37-32bit-2.24.1-3.24.1">libwebkit2gtk-4_0-37-32bit-2.24.1-3.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk-4_0-37-64bit-2.24.1-3.24.1">
      <FullProductName ProductID="libwebkit2gtk-4_0-37-64bit-2.24.1-3.24.1">libwebkit2gtk-4_0-37-64bit-2.24.1-3.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk3-lang-2.24.1-3.24.1">
      <FullProductName ProductID="libwebkit2gtk3-lang-2.24.1-3.24.1">libwebkit2gtk3-lang-2.24.1-3.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-JavaScriptCore-4_0-2.24.1-3.24.1">
      <FullProductName ProductID="typelib-1_0-JavaScriptCore-4_0-2.24.1-3.24.1">typelib-1_0-JavaScriptCore-4_0-2.24.1-3.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit2-4_0-2.24.1-3.24.1">
      <FullProductName ProductID="typelib-1_0-WebKit2-4_0-2.24.1-3.24.1">typelib-1_0-WebKit2-4_0-2.24.1-3.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-3.24.1">
      <FullProductName ProductID="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-3.24.1">typelib-1_0-WebKit2WebExtension-4_0-2.24.1-3.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit-jsc-4-2.24.1-3.24.1">
      <FullProductName ProductID="webkit-jsc-4-2.24.1-3.24.1">webkit-jsc-4-2.24.1-3.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk-4_0-injected-bundles-2.24.1-3.24.1">
      <FullProductName ProductID="webkit2gtk-4_0-injected-bundles-2.24.1-3.24.1">webkit2gtk-4_0-injected-bundles-2.24.1-3.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk3-devel-2.24.1-3.24.1">
      <FullProductName ProductID="webkit2gtk3-devel-2.24.1-3.24.1">webkit2gtk3-devel-2.24.1-3.24.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk3-minibrowser-2.24.1-3.24.1">
      <FullProductName ProductID="webkit2gtk3-minibrowser-2.24.1-3.24.1">webkit2gtk3-minibrowser-2.24.1-3.24.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libjavascriptcoregtk-4_0-18-2.24.1-3.24.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15:libjavascriptcoregtk-4_0-18-2.24.1-3.24.1">libjavascriptcoregtk-4_0-18-2.24.1-3.24.1 as a component of SUSE Linux Enterprise Module for Basesystem 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk-4_0-37-2.24.1-3.24.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk-4_0-37-2.24.1-3.24.1">libwebkit2gtk-4_0-37-2.24.1-3.24.1 as a component of SUSE Linux Enterprise Module for Basesystem 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk3-lang-2.24.1-3.24.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk3-lang-2.24.1-3.24.1">libwebkit2gtk3-lang-2.24.1-3.24.1 as a component of SUSE Linux Enterprise Module for Basesystem 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk-4_0-injected-bundles-2.24.1-3.24.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15:webkit2gtk-4_0-injected-bundles-2.24.1-3.24.1">webkit2gtk-4_0-injected-bundles-2.24.1-3.24.1 as a component of SUSE Linux Enterprise Module for Basesystem 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-JavaScriptCore-4_0-2.24.1-3.24.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Desktop Applications 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-JavaScriptCore-4_0-2.24.1-3.24.1">typelib-1_0-JavaScriptCore-4_0-2.24.1-3.24.1 as a component of SUSE Linux Enterprise Module for Desktop Applications 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-WebKit2-4_0-2.24.1-3.24.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Desktop Applications 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2-4_0-2.24.1-3.24.1">typelib-1_0-WebKit2-4_0-2.24.1-3.24.1 as a component of SUSE Linux Enterprise Module for Desktop Applications 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-WebKit2WebExtension-4_0-2.24.1-3.24.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Desktop Applications 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2WebExtension-4_0-2.24.1-3.24.1">typelib-1_0-WebKit2WebExtension-4_0-2.24.1-3.24.1 as a component of SUSE Linux Enterprise Module for Desktop Applications 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk3-devel-2.24.1-3.24.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Desktop Applications 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Desktop Applications 15:webkit2gtk3-devel-2.24.1-3.24.1">webkit2gtk3-devel-2.24.1-3.24.1 as a component of SUSE Linux Enterprise Module for Desktop Applications 15</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKitGTK and WPE WebKit prior to version 2.24.1 failed to properly apply configured HTTP proxy settings when downloading livestream video (HLS, DASH, or Smooth Streaming), an error resulting in deanonymization. This issue was corrected by changing the way livestreams are downloaded.</Note>
    </Notes>
    <CVE>CVE-2019-11070</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libjavascriptcoregtk-4_0-18-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk-4_0-37-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk3-lang-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:webkit2gtk-4_0-injected-bundles-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-JavaScriptCore-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2WebExtension-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:webkit2gtk3-devel-2.24.1-3.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191137-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11070.html</URL>
        <Description>CVE-2019-11070</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132196</URL>
        <Description>SUSE Bug 1132196</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132256</URL>
        <Description>SUSE Bug 1132256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-6201</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libjavascriptcoregtk-4_0-18-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk-4_0-37-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk3-lang-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:webkit2gtk-4_0-injected-bundles-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-JavaScriptCore-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2WebExtension-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:webkit2gtk3-devel-2.24.1-3.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191137-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-6201.html</URL>
        <Description>CVE-2019-6201</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132256</URL>
        <Description>SUSE Bug 1132256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebKitGTK and WPE WebKit prior to version 2.24.1 are vulnerable to address bar spoofing upon certain JavaScript redirections. An attacker could cause malicious web content to be displayed as if for a trusted URI. This is similar to the CVE-2018-8383 issue in Microsoft Edge.</Note>
    </Notes>
    <CVE>CVE-2019-6251</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libjavascriptcoregtk-4_0-18-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk-4_0-37-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk3-lang-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:webkit2gtk-4_0-injected-bundles-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-JavaScriptCore-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2WebExtension-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:webkit2gtk3-devel-2.24.1-3.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191137-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-6251.html</URL>
        <Description>CVE-2019-6251</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121894</URL>
        <Description>SUSE Bug 1121894</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132256</URL>
        <Description>SUSE Bug 1132256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-7285</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libjavascriptcoregtk-4_0-18-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk-4_0-37-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk3-lang-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:webkit2gtk-4_0-injected-bundles-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-JavaScriptCore-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2WebExtension-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:webkit2gtk3-devel-2.24.1-3.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191137-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-7285.html</URL>
        <Description>CVE-2019-7285</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132256</URL>
        <Description>SUSE Bug 1132256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A validation issue was addressed with improved logic. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may result in the disclosure of process memory.</Note>
    </Notes>
    <CVE>CVE-2019-7292</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libjavascriptcoregtk-4_0-18-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk-4_0-37-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk3-lang-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:webkit2gtk-4_0-injected-bundles-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-JavaScriptCore-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2WebExtension-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:webkit2gtk3-devel-2.24.1-3.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191137-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-7292.html</URL>
        <Description>CVE-2019-7292</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132256</URL>
        <Description>SUSE Bug 1132256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A logic issue was addressed with improved validation. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. A malicious website may be able to execute scripts in the context of another website.</Note>
    </Notes>
    <CVE>CVE-2019-8503</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libjavascriptcoregtk-4_0-18-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk-4_0-37-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk3-lang-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:webkit2gtk-4_0-injected-bundles-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-JavaScriptCore-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2WebExtension-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:webkit2gtk3-devel-2.24.1-3.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191137-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8503.html</URL>
        <Description>CVE-2019-8503</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132256</URL>
        <Description>SUSE Bug 1132256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8506</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libjavascriptcoregtk-4_0-18-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk-4_0-37-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk3-lang-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:webkit2gtk-4_0-injected-bundles-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-JavaScriptCore-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2WebExtension-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:webkit2gtk3-devel-2.24.1-3.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191137-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8506.html</URL>
        <Description>CVE-2019-8506</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132256</URL>
        <Description>SUSE Bug 1132256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A cross-origin issue existed with the fetch API. This was addressed with improved input validation. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may disclose sensitive user information.</Note>
    </Notes>
    <CVE>CVE-2019-8515</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libjavascriptcoregtk-4_0-18-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk-4_0-37-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk3-lang-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:webkit2gtk-4_0-injected-bundles-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-JavaScriptCore-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2WebExtension-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:webkit2gtk3-devel-2.24.1-3.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191137-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8515.html</URL>
        <Description>CVE-2019-8515</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132256</URL>
        <Description>SUSE Bug 1132256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8518</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libjavascriptcoregtk-4_0-18-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk-4_0-37-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk3-lang-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:webkit2gtk-4_0-injected-bundles-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-JavaScriptCore-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2WebExtension-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:webkit2gtk3-devel-2.24.1-3.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191137-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8518.html</URL>
        <Description>CVE-2019-8518</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132256</URL>
        <Description>SUSE Bug 1132256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8523</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libjavascriptcoregtk-4_0-18-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk-4_0-37-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk3-lang-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:webkit2gtk-4_0-injected-bundles-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-JavaScriptCore-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2WebExtension-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:webkit2gtk3-devel-2.24.1-3.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191137-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8523.html</URL>
        <Description>CVE-2019-8523</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132256</URL>
        <Description>SUSE Bug 1132256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8524</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libjavascriptcoregtk-4_0-18-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk-4_0-37-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk3-lang-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:webkit2gtk-4_0-injected-bundles-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-JavaScriptCore-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2WebExtension-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:webkit2gtk3-devel-2.24.1-3.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191137-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8524.html</URL>
        <Description>CVE-2019-8524</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132256</URL>
        <Description>SUSE Bug 1132256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8535</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libjavascriptcoregtk-4_0-18-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk-4_0-37-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk3-lang-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:webkit2gtk-4_0-injected-bundles-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-JavaScriptCore-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2WebExtension-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:webkit2gtk3-devel-2.24.1-3.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191137-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8535.html</URL>
        <Description>CVE-2019-8535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132256</URL>
        <Description>SUSE Bug 1132256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8536</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libjavascriptcoregtk-4_0-18-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk-4_0-37-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk3-lang-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:webkit2gtk-4_0-injected-bundles-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-JavaScriptCore-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2WebExtension-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:webkit2gtk3-devel-2.24.1-3.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191137-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8536.html</URL>
        <Description>CVE-2019-8536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132256</URL>
        <Description>SUSE Bug 1132256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8544</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libjavascriptcoregtk-4_0-18-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk-4_0-37-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk3-lang-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:webkit2gtk-4_0-injected-bundles-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-JavaScriptCore-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2WebExtension-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:webkit2gtk3-devel-2.24.1-3.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191137-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8544.html</URL>
        <Description>CVE-2019-8544</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132256</URL>
        <Description>SUSE Bug 1132256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A logic issue was addressed with improved validation. This issue is fixed in iOS 12.2, tvOS 12.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to universal cross site scripting.</Note>
    </Notes>
    <CVE>CVE-2019-8551</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libjavascriptcoregtk-4_0-18-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk-4_0-37-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk3-lang-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:webkit2gtk-4_0-injected-bundles-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-JavaScriptCore-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2WebExtension-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:webkit2gtk3-devel-2.24.1-3.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191137-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8551.html</URL>
        <Description>CVE-2019-8551</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132256</URL>
        <Description>SUSE Bug 1132256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8558</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libjavascriptcoregtk-4_0-18-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk-4_0-37-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk3-lang-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:webkit2gtk-4_0-injected-bundles-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-JavaScriptCore-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2WebExtension-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:webkit2gtk3-devel-2.24.1-3.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191137-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8558.html</URL>
        <Description>CVE-2019-8558</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132256</URL>
        <Description>SUSE Bug 1132256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8559</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libjavascriptcoregtk-4_0-18-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk-4_0-37-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk3-lang-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:webkit2gtk-4_0-injected-bundles-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-JavaScriptCore-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2WebExtension-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:webkit2gtk3-devel-2.24.1-3.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191137-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8559.html</URL>
        <Description>CVE-2019-8559</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132256</URL>
        <Description>SUSE Bug 1132256</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8563</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libjavascriptcoregtk-4_0-18-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk-4_0-37-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk3-lang-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:webkit2gtk-4_0-injected-bundles-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-JavaScriptCore-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2WebExtension-4_0-2.24.1-3.24.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:webkit2gtk3-devel-2.24.1-3.24.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2019/suse-su-20191137-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8563.html</URL>
        <Description>CVE-2019-8563</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1132256</URL>
        <Description>SUSE Bug 1132256</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
