<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for webkit2gtk3</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2019:0308-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-03-23T11:09:58Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-03-23T11:09:58Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-03-23T11:09:58Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for webkit2gtk3</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for webkit2gtk3 to version 2.22.6 fixes the following issues (boo#1124937 boo#1119558):

Security vulnerabilities fixed:

- CVE-2018-4437: Processing maliciously crafted web content may lead to
  arbitrary code execution. Multiple memory corruption issues were addressed
  with improved memory handling. (boo#1119553)
- CVE-2018-4438: Processing maliciously crafted web content may lead to
  arbitrary code execution. A logic issue existed resulting in memory
  corruption. This was addressed with improved state management. (boo#1119554)
- CVE-2018-4441: Processing maliciously crafted web content may lead to
  arbitrary code execution. A memory corruption issue was addressed with
  improved memory handling. (boo#1119555)
- CVE-2018-4442: Processing maliciously crafted web content may lead to
  arbitrary code execution. A memory corruption issue was addressed with
  improved memory handling. (boo#1119556)
- CVE-2018-4443: Processing maliciously crafted web content may lead to
  arbitrary code execution. A memory corruption issue was addressed with
  improved memory handling. (boo#1119557)
- CVE-2018-4464: Processing maliciously crafted web content may lead to
  arbitrary code execution. Multiple memory corruption issues were addressed
  with improved memory handling. (boo#1119558)
- CVE-2019-6212: Processing maliciously crafted web content may lead to
  arbitrary code execution. Multiple memory corruption issues were addressed
  with improved memory handling.
- CVE-2019-6215: Processing maliciously crafted web content may lead to
  arbitrary code execution. A type confusion issue was addressed with improved
  memory handling.
- CVE-2019-6216: Processing maliciously crafted web content may lead to
  arbitrary code execution. Multiple memory corruption issues were addressed
  with improved memory handling.
- CVE-2019-6217: Processing maliciously crafted web content may lead to
  arbitrary code execution. Multiple memory corruption issues were addressed
  with improved memory handling.
- CVE-2019-6226: Processing maliciously crafted web content may lead to
  arbitrary code execution. Multiple memory corruption issues were addressed
  with improved memory handling.
- CVE-2019-6227: Processing maliciously crafted web content may lead to
  arbitrary code execution. A memory corruption issue was addressed with
  improved memory handling.
- CVE-2019-6229: Processing maliciously crafted web content may lead to
  universal cross site scripting. A logic issue was addressed with improved
  validation.
- CVE-2019-6233: Processing maliciously crafted web content may lead to
  arbitrary code execution. A memory corruption issue was addressed with
  improved memory handling.
- CVE-2019-6234: Processing maliciously crafted web content may lead to
  arbitrary code execution. A memory corruption issue was addressed with
  improved memory handling.

Other bug fixes and changes:

- Make kinetic scrolling slow down smoothly when reaching the ends of pages,
  instead of abruptly, to better match the GTK+ behaviour.
- Fix Web inspector magnifier under Wayland.
- Fix garbled rendering of some websites (e.g. YouTube) while scrolling under
  X11.
- Fix several crashes, race conditions, and rendering issues.

For a detailed list of changes, please refer to:

- https://webkitgtk.org/security/WSA-2019-0001.html
- https://webkitgtk.org/2019/02/09/webkitgtk2.22.6-released.html
- https://webkitgtk.org/security/WSA-2018-0009.html
- https://webkitgtk.org/2018/12/13/webkitgtk2.22.5-released.html

    
This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2019-308</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOC7EROFYXM7H5YCNM5NI27KEAEP5HCQ/#VOC7EROFYXM7H5YCNM5NI27KEAEP5HCQ</URL>
      <Description>E-Mail link for openSUSE-SU-2019:0308-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1119553</URL>
      <Description>SUSE Bug 1119553</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1119554</URL>
      <Description>SUSE Bug 1119554</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1119555</URL>
      <Description>SUSE Bug 1119555</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1119556</URL>
      <Description>SUSE Bug 1119556</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1119557</URL>
      <Description>SUSE Bug 1119557</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1119558</URL>
      <Description>SUSE Bug 1119558</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1124937</URL>
      <Description>SUSE Bug 1124937</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4437/</URL>
      <Description>SUSE CVE CVE-2018-4437 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4438/</URL>
      <Description>SUSE CVE CVE-2018-4438 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4441/</URL>
      <Description>SUSE CVE CVE-2018-4441 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4442/</URL>
      <Description>SUSE CVE CVE-2018-4442 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4443/</URL>
      <Description>SUSE CVE CVE-2018-4443 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4464/</URL>
      <Description>SUSE CVE CVE-2018-4464 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-6212/</URL>
      <Description>SUSE CVE CVE-2019-6212 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-6215/</URL>
      <Description>SUSE CVE CVE-2019-6215 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-6216/</URL>
      <Description>SUSE CVE CVE-2019-6216 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-6217/</URL>
      <Description>SUSE CVE CVE-2019-6217 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-6226/</URL>
      <Description>SUSE CVE CVE-2019-6226 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-6227/</URL>
      <Description>SUSE CVE CVE-2019-6227 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-6229/</URL>
      <Description>SUSE CVE CVE-2019-6229 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-6233/</URL>
      <Description>SUSE CVE CVE-2019-6233 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-6234/</URL>
      <Description>SUSE CVE CVE-2019-6234 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.0">
      <Branch Type="Product Name" Name="openSUSE Leap 15.0">
        <FullProductName ProductID="openSUSE Leap 15.0" CPE="cpe:/o:opensuse:leap:15.0">openSUSE Leap 15.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-4_0-18-2.22.6-lp150.2.12.1">
      <FullProductName ProductID="libjavascriptcoregtk-4_0-18-2.22.6-lp150.2.12.1">libjavascriptcoregtk-4_0-18-2.22.6-lp150.2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-4_0-18-32bit-2.22.6-lp150.2.12.1">
      <FullProductName ProductID="libjavascriptcoregtk-4_0-18-32bit-2.22.6-lp150.2.12.1">libjavascriptcoregtk-4_0-18-32bit-2.22.6-lp150.2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk-4_0-37-2.22.6-lp150.2.12.1">
      <FullProductName ProductID="libwebkit2gtk-4_0-37-2.22.6-lp150.2.12.1">libwebkit2gtk-4_0-37-2.22.6-lp150.2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk-4_0-37-32bit-2.22.6-lp150.2.12.1">
      <FullProductName ProductID="libwebkit2gtk-4_0-37-32bit-2.22.6-lp150.2.12.1">libwebkit2gtk-4_0-37-32bit-2.22.6-lp150.2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk3-lang-2.22.6-lp150.2.12.1">
      <FullProductName ProductID="libwebkit2gtk3-lang-2.22.6-lp150.2.12.1">libwebkit2gtk3-lang-2.22.6-lp150.2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-JavaScriptCore-4_0-2.22.6-lp150.2.12.1">
      <FullProductName ProductID="typelib-1_0-JavaScriptCore-4_0-2.22.6-lp150.2.12.1">typelib-1_0-JavaScriptCore-4_0-2.22.6-lp150.2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit2-4_0-2.22.6-lp150.2.12.1">
      <FullProductName ProductID="typelib-1_0-WebKit2-4_0-2.22.6-lp150.2.12.1">typelib-1_0-WebKit2-4_0-2.22.6-lp150.2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit2WebExtension-4_0-2.22.6-lp150.2.12.1">
      <FullProductName ProductID="typelib-1_0-WebKit2WebExtension-4_0-2.22.6-lp150.2.12.1">typelib-1_0-WebKit2WebExtension-4_0-2.22.6-lp150.2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit-jsc-4-2.22.6-lp150.2.12.1">
      <FullProductName ProductID="webkit-jsc-4-2.22.6-lp150.2.12.1">webkit-jsc-4-2.22.6-lp150.2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk-4_0-injected-bundles-2.22.6-lp150.2.12.1">
      <FullProductName ProductID="webkit2gtk-4_0-injected-bundles-2.22.6-lp150.2.12.1">webkit2gtk-4_0-injected-bundles-2.22.6-lp150.2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk3-devel-2.22.6-lp150.2.12.1">
      <FullProductName ProductID="webkit2gtk3-devel-2.22.6-lp150.2.12.1">webkit2gtk3-devel-2.22.6-lp150.2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk3-minibrowser-2.22.6-lp150.2.12.1">
      <FullProductName ProductID="webkit2gtk3-minibrowser-2.22.6-lp150.2.12.1">webkit2gtk3-minibrowser-2.22.6-lp150.2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk3-plugin-process-gtk2-2.22.6-lp150.2.12.1">
      <FullProductName ProductID="webkit2gtk3-plugin-process-gtk2-2.22.6-lp150.2.12.1">webkit2gtk3-plugin-process-gtk2-2.22.6-lp150.2.12.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libjavascriptcoregtk-4_0-18-2.22.6-lp150.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.6-lp150.2.12.1">libjavascriptcoregtk-4_0-18-2.22.6-lp150.2.12.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libjavascriptcoregtk-4_0-18-32bit-2.22.6-lp150.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.6-lp150.2.12.1">libjavascriptcoregtk-4_0-18-32bit-2.22.6-lp150.2.12.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk-4_0-37-2.22.6-lp150.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.6-lp150.2.12.1">libwebkit2gtk-4_0-37-2.22.6-lp150.2.12.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk-4_0-37-32bit-2.22.6-lp150.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.6-lp150.2.12.1">libwebkit2gtk-4_0-37-32bit-2.22.6-lp150.2.12.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk3-lang-2.22.6-lp150.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.6-lp150.2.12.1">libwebkit2gtk3-lang-2.22.6-lp150.2.12.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-JavaScriptCore-4_0-2.22.6-lp150.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.6-lp150.2.12.1">typelib-1_0-JavaScriptCore-4_0-2.22.6-lp150.2.12.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-WebKit2-4_0-2.22.6-lp150.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.6-lp150.2.12.1">typelib-1_0-WebKit2-4_0-2.22.6-lp150.2.12.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-WebKit2WebExtension-4_0-2.22.6-lp150.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.6-lp150.2.12.1">typelib-1_0-WebKit2WebExtension-4_0-2.22.6-lp150.2.12.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit-jsc-4-2.22.6-lp150.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:webkit-jsc-4-2.22.6-lp150.2.12.1">webkit-jsc-4-2.22.6-lp150.2.12.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk-4_0-injected-bundles-2.22.6-lp150.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.6-lp150.2.12.1">webkit2gtk-4_0-injected-bundles-2.22.6-lp150.2.12.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk3-devel-2.22.6-lp150.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:webkit2gtk3-devel-2.22.6-lp150.2.12.1">webkit2gtk3-devel-2.22.6-lp150.2.12.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk3-minibrowser-2.22.6-lp150.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.6-lp150.2.12.1">webkit2gtk3-minibrowser-2.22.6-lp150.2.12.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk3-plugin-process-gtk2-2.22.6-lp150.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.6-lp150.2.12.1">webkit2gtk3-plugin-process-gtk2-2.22.6-lp150.2.12.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1.1, tvOS 12.1.1, watchOS 5.1.2, Safari 12.0.2, iTunes 12.9.2 for Windows, iCloud for Windows 7.9.</Note>
    </Notes>
    <CVE>CVE-2018-4437</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.6-lp150.2.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOC7EROFYXM7H5YCNM5NI27KEAEP5HCQ/#VOC7EROFYXM7H5YCNM5NI27KEAEP5HCQ</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4437.html</URL>
        <Description>CVE-2018-4437</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119553</URL>
        <Description>SUSE Bug 1119553</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A logic issue existed resulting in memory corruption. This was addressed with improved state management. This issue affected versions prior to iOS 12.1.1, tvOS 12.1.1, watchOS 5.1.2, Safari 12.0.2, iTunes 12.9.2 for Windows, iCloud for Windows 7.9.</Note>
    </Notes>
    <CVE>CVE-2018-4438</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.6-lp150.2.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOC7EROFYXM7H5YCNM5NI27KEAEP5HCQ/#VOC7EROFYXM7H5YCNM5NI27KEAEP5HCQ</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4438.html</URL>
        <Description>CVE-2018-4438</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119554</URL>
        <Description>SUSE Bug 1119554</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12.1.1, tvOS 12.1.1, watchOS 5.1.2, Safari 12.0.2, iTunes 12.9.2 for Windows, iCloud for Windows 7.9.</Note>
    </Notes>
    <CVE>CVE-2018-4441</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.6-lp150.2.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOC7EROFYXM7H5YCNM5NI27KEAEP5HCQ/#VOC7EROFYXM7H5YCNM5NI27KEAEP5HCQ</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4441.html</URL>
        <Description>CVE-2018-4441</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119555</URL>
        <Description>SUSE Bug 1119555</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12.1.1, tvOS 12.1.1, watchOS 5.1.2, Safari 12.0.2, iTunes 12.9.2 for Windows, iCloud for Windows 7.9.</Note>
    </Notes>
    <CVE>CVE-2018-4442</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.6-lp150.2.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOC7EROFYXM7H5YCNM5NI27KEAEP5HCQ/#VOC7EROFYXM7H5YCNM5NI27KEAEP5HCQ</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4442.html</URL>
        <Description>CVE-2018-4442</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119556</URL>
        <Description>SUSE Bug 1119556</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12.1.1, tvOS 12.1.1, watchOS 5.1.2, Safari 12.0.2, iTunes 12.9.2 for Windows, iCloud for Windows 7.9.</Note>
    </Notes>
    <CVE>CVE-2018-4443</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.6-lp150.2.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOC7EROFYXM7H5YCNM5NI27KEAEP5HCQ/#VOC7EROFYXM7H5YCNM5NI27KEAEP5HCQ</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4443.html</URL>
        <Description>CVE-2018-4443</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119557</URL>
        <Description>SUSE Bug 1119557</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1.1, tvOS 12.1.1, watchOS 5.1.2, Safari 12.0.2, iTunes 12.9.2 for Windows, iCloud for Windows 7.9.</Note>
    </Notes>
    <CVE>CVE-2018-4464</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.6-lp150.2.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOC7EROFYXM7H5YCNM5NI27KEAEP5HCQ/#VOC7EROFYXM7H5YCNM5NI27KEAEP5HCQ</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4464.html</URL>
        <Description>CVE-2018-4464</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119553</URL>
        <Description>SUSE Bug 1119553</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119558</URL>
        <Description>SUSE Bug 1119558</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-6212</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.6-lp150.2.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOC7EROFYXM7H5YCNM5NI27KEAEP5HCQ/#VOC7EROFYXM7H5YCNM5NI27KEAEP5HCQ</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-6212.html</URL>
        <Description>CVE-2019-6212</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1124937</URL>
        <Description>SUSE Bug 1124937</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-6215</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.6-lp150.2.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOC7EROFYXM7H5YCNM5NI27KEAEP5HCQ/#VOC7EROFYXM7H5YCNM5NI27KEAEP5HCQ</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-6215.html</URL>
        <Description>CVE-2019-6215</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1124937</URL>
        <Description>SUSE Bug 1124937</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, watchOS 5.1.3, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-6216</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.6-lp150.2.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOC7EROFYXM7H5YCNM5NI27KEAEP5HCQ/#VOC7EROFYXM7H5YCNM5NI27KEAEP5HCQ</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-6216.html</URL>
        <Description>CVE-2019-6216</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1124937</URL>
        <Description>SUSE Bug 1124937</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, watchOS 5.1.3, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-6217</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.6-lp150.2.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOC7EROFYXM7H5YCNM5NI27KEAEP5HCQ/#VOC7EROFYXM7H5YCNM5NI27KEAEP5HCQ</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-6217.html</URL>
        <Description>CVE-2019-6217</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1124937</URL>
        <Description>SUSE Bug 1124937</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, watchOS 5.1.3, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-6226</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.6-lp150.2.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOC7EROFYXM7H5YCNM5NI27KEAEP5HCQ/#VOC7EROFYXM7H5YCNM5NI27KEAEP5HCQ</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-6226.html</URL>
        <Description>CVE-2019-6226</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1124937</URL>
        <Description>SUSE Bug 1124937</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, watchOS 5.1.3, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-6227</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.6-lp150.2.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOC7EROFYXM7H5YCNM5NI27KEAEP5HCQ/#VOC7EROFYXM7H5YCNM5NI27KEAEP5HCQ</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-6227.html</URL>
        <Description>CVE-2019-6227</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1124937</URL>
        <Description>SUSE Bug 1124937</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A logic issue was addressed with improved validation. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to universal cross site scripting.</Note>
    </Notes>
    <CVE>CVE-2019-6229</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.6-lp150.2.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOC7EROFYXM7H5YCNM5NI27KEAEP5HCQ/#VOC7EROFYXM7H5YCNM5NI27KEAEP5HCQ</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-6229.html</URL>
        <Description>CVE-2019-6229</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1124937</URL>
        <Description>SUSE Bug 1124937</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-6233</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.6-lp150.2.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOC7EROFYXM7H5YCNM5NI27KEAEP5HCQ/#VOC7EROFYXM7H5YCNM5NI27KEAEP5HCQ</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-6233.html</URL>
        <Description>CVE-2019-6233</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1124937</URL>
        <Description>SUSE Bug 1124937</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3, tvOS 12.1.2, Safari 12.0.3, iTunes 12.9.3 for Windows, iCloud for Windows 7.10. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-6234</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-minibrowser-2.22.6-lp150.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.22.6-lp150.2.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOC7EROFYXM7H5YCNM5NI27KEAEP5HCQ/#VOC7EROFYXM7H5YCNM5NI27KEAEP5HCQ</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-6234.html</URL>
        <Description>CVE-2019-6234</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1124937</URL>
        <Description>SUSE Bug 1124937</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
