<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for webkit2gtk3</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2020:0278-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2020-03-01T23:15:29Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2020-03-01T23:15:29Z</InitialReleaseDate>
    <CurrentReleaseDate>2020-03-01T23:15:29Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for webkit2gtk3</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for webkit2gtk3 to version 2.26.4 fixes the following issues:

Security issues fixed:

- CVE-2019-8835: Fixed multiple memory corruption issues (bsc#1161719).
- CVE-2019-8844: Fixed multiple memory corruption issues (bsc#1161719).
- CVE-2019-8846: Fixed a use-after-free issue (bsc#1161719).
- CVE-2020-3862: Fixed a memory handling issue (bsc#1163809).
- CVE-2020-3864: Fixed a logic issue in the DOM object context handling (bsc#1163809).
- CVE-2020-3865: Fixed a logic issue in the DOM object context handling (bsc#1163809).
- CVE-2020-3867: Fixed an XSS issue (bsc#1163809).
- CVE-2020-3868: Fixed multiple memory corruption issues that could have lead to arbitrary code execution (bsc#1163809).

Non-security issues fixed:

- Fixed issues while trying to play a video on NextCloud.
- Fixed vertical alignment of text containing arabic diacritics.
- Fixed build with icu 65.1.
- Fixed page loading errors with websites using HSTS.
- Fixed web process crash when displaying a KaTeX formula.
- Fixed several crashes and rendering issues.
- Switched to a single web process for Evolution and geary (bsc#1159329 glgo#GNOME/evolution#587).

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2020-278</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOF6TVHJ47XHC6EPRQMZJI47W7QNTVVH/</URL>
      <Description>E-Mail link for openSUSE-SU-2020:0278-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1159329</URL>
      <Description>SUSE Bug 1159329</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1161719</URL>
      <Description>SUSE Bug 1161719</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1163809</URL>
      <Description>SUSE Bug 1163809</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8835/</URL>
      <Description>SUSE CVE CVE-2019-8835 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8844/</URL>
      <Description>SUSE CVE CVE-2019-8844 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-8846/</URL>
      <Description>SUSE CVE CVE-2019-8846 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-3862/</URL>
      <Description>SUSE CVE CVE-2020-3862 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-3864/</URL>
      <Description>SUSE CVE CVE-2020-3864 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-3865/</URL>
      <Description>SUSE CVE CVE-2020-3865 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-3867/</URL>
      <Description>SUSE CVE CVE-2020-3867 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-3868/</URL>
      <Description>SUSE CVE CVE-2020-3868 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.1">
      <Branch Type="Product Name" Name="openSUSE Leap 15.1">
        <FullProductName ProductID="openSUSE Leap 15.1" CPE="cpe:/o:opensuse:leap:15.1">openSUSE Leap 15.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-4_0-18-2.26.4-lp151.2.12.1">
      <FullProductName ProductID="libjavascriptcoregtk-4_0-18-2.26.4-lp151.2.12.1">libjavascriptcoregtk-4_0-18-2.26.4-lp151.2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-4_0-18-32bit-2.26.4-lp151.2.12.1">
      <FullProductName ProductID="libjavascriptcoregtk-4_0-18-32bit-2.26.4-lp151.2.12.1">libjavascriptcoregtk-4_0-18-32bit-2.26.4-lp151.2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk-4_0-37-2.26.4-lp151.2.12.1">
      <FullProductName ProductID="libwebkit2gtk-4_0-37-2.26.4-lp151.2.12.1">libwebkit2gtk-4_0-37-2.26.4-lp151.2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk-4_0-37-32bit-2.26.4-lp151.2.12.1">
      <FullProductName ProductID="libwebkit2gtk-4_0-37-32bit-2.26.4-lp151.2.12.1">libwebkit2gtk-4_0-37-32bit-2.26.4-lp151.2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk3-lang-2.26.4-lp151.2.12.1">
      <FullProductName ProductID="libwebkit2gtk3-lang-2.26.4-lp151.2.12.1">libwebkit2gtk3-lang-2.26.4-lp151.2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-JavaScriptCore-4_0-2.26.4-lp151.2.12.1">
      <FullProductName ProductID="typelib-1_0-JavaScriptCore-4_0-2.26.4-lp151.2.12.1">typelib-1_0-JavaScriptCore-4_0-2.26.4-lp151.2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit2-4_0-2.26.4-lp151.2.12.1">
      <FullProductName ProductID="typelib-1_0-WebKit2-4_0-2.26.4-lp151.2.12.1">typelib-1_0-WebKit2-4_0-2.26.4-lp151.2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit2WebExtension-4_0-2.26.4-lp151.2.12.1">
      <FullProductName ProductID="typelib-1_0-WebKit2WebExtension-4_0-2.26.4-lp151.2.12.1">typelib-1_0-WebKit2WebExtension-4_0-2.26.4-lp151.2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit-jsc-4-2.26.4-lp151.2.12.1">
      <FullProductName ProductID="webkit-jsc-4-2.26.4-lp151.2.12.1">webkit-jsc-4-2.26.4-lp151.2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk-4_0-injected-bundles-2.26.4-lp151.2.12.1">
      <FullProductName ProductID="webkit2gtk-4_0-injected-bundles-2.26.4-lp151.2.12.1">webkit2gtk-4_0-injected-bundles-2.26.4-lp151.2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk3-devel-2.26.4-lp151.2.12.1">
      <FullProductName ProductID="webkit2gtk3-devel-2.26.4-lp151.2.12.1">webkit2gtk3-devel-2.26.4-lp151.2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk3-minibrowser-2.26.4-lp151.2.12.1">
      <FullProductName ProductID="webkit2gtk3-minibrowser-2.26.4-lp151.2.12.1">webkit2gtk3-minibrowser-2.26.4-lp151.2.12.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libjavascriptcoregtk-4_0-18-2.26.4-lp151.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.26.4-lp151.2.12.1">libjavascriptcoregtk-4_0-18-2.26.4-lp151.2.12.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libjavascriptcoregtk-4_0-18-32bit-2.26.4-lp151.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-32bit-2.26.4-lp151.2.12.1">libjavascriptcoregtk-4_0-18-32bit-2.26.4-lp151.2.12.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk-4_0-37-2.26.4-lp151.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.26.4-lp151.2.12.1">libwebkit2gtk-4_0-37-2.26.4-lp151.2.12.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk-4_0-37-32bit-2.26.4-lp151.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libwebkit2gtk-4_0-37-32bit-2.26.4-lp151.2.12.1">libwebkit2gtk-4_0-37-32bit-2.26.4-lp151.2.12.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk3-lang-2.26.4-lp151.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:libwebkit2gtk3-lang-2.26.4-lp151.2.12.1">libwebkit2gtk3-lang-2.26.4-lp151.2.12.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-JavaScriptCore-4_0-2.26.4-lp151.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.26.4-lp151.2.12.1">typelib-1_0-JavaScriptCore-4_0-2.26.4-lp151.2.12.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-WebKit2-4_0-2.26.4-lp151.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.26.4-lp151.2.12.1">typelib-1_0-WebKit2-4_0-2.26.4-lp151.2.12.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-WebKit2WebExtension-4_0-2.26.4-lp151.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.26.4-lp151.2.12.1">typelib-1_0-WebKit2WebExtension-4_0-2.26.4-lp151.2.12.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit-jsc-4-2.26.4-lp151.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:webkit-jsc-4-2.26.4-lp151.2.12.1">webkit-jsc-4-2.26.4-lp151.2.12.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk-4_0-injected-bundles-2.26.4-lp151.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.26.4-lp151.2.12.1">webkit2gtk-4_0-injected-bundles-2.26.4-lp151.2.12.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk3-devel-2.26.4-lp151.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:webkit2gtk3-devel-2.26.4-lp151.2.12.1">webkit2gtk3-devel-2.26.4-lp151.2.12.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk3-minibrowser-2.26.4-lp151.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.26.4-lp151.2.12.1">webkit2gtk3-minibrowser-2.26.4-lp151.2.12.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13.3, iCloud for Windows 10.9, iOS 13.3 and iPadOS 13.3, Safari 13.0.4, iTunes 12.10.3 for Windows, iCloud for Windows 7.16. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8835</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-32bit-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwebkit2gtk-4_0-37-32bit-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwebkit2gtk3-lang-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:webkit-jsc-4-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:webkit2gtk3-devel-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.26.4-lp151.2.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOF6TVHJ47XHC6EPRQMZJI47W7QNTVVH/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8835.html</URL>
        <Description>CVE-2019-8835</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1161719</URL>
        <Description>SUSE Bug 1161719</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13.3, watchOS 6.1.1, iCloud for Windows 10.9, iOS 13.3 and iPadOS 13.3, Safari 13.0.4, iTunes 12.10.3 for Windows, iCloud for Windows 7.16. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8844</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-32bit-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwebkit2gtk-4_0-37-32bit-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwebkit2gtk3-lang-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:webkit-jsc-4-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:webkit2gtk3-devel-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.26.4-lp151.2.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOF6TVHJ47XHC6EPRQMZJI47W7QNTVVH/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8844.html</URL>
        <Description>CVE-2019-8844</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1161719</URL>
        <Description>SUSE Bug 1161719</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 13.3, iCloud for Windows 10.9, iOS 13.3 and iPadOS 13.3, Safari 13.0.4, iTunes 12.10.3 for Windows, iCloud for Windows 7.16. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2019-8846</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-32bit-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwebkit2gtk-4_0-37-32bit-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwebkit2gtk3-lang-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:webkit-jsc-4-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:webkit2gtk3-devel-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.26.4-lp151.2.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOF6TVHJ47XHC6EPRQMZJI47W7QNTVVH/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-8846.html</URL>
        <Description>CVE-2019-8846</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1161719</URL>
        <Description>SUSE Bug 1161719</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A denial of service issue was addressed with improved memory handling. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1, Safari 13.0.5, iTunes for Windows 12.10.4, iCloud for Windows 11.0, iCloud for Windows 7.17. A malicious website may be able to cause a denial of service.</Note>
    </Notes>
    <CVE>CVE-2020-3862</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-32bit-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwebkit2gtk-4_0-37-32bit-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwebkit2gtk3-lang-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:webkit-jsc-4-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:webkit2gtk3-devel-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.26.4-lp151.2.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOF6TVHJ47XHC6EPRQMZJI47W7QNTVVH/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-3862.html</URL>
        <Description>CVE-2020-3862</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1163809</URL>
        <Description>SUSE Bug 1163809</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A logic issue was addressed with improved validation. This issue is fixed in iCloud for Windows 7.17, iTunes 12.10.4 for Windows, iCloud for Windows 10.9.2, tvOS 13.3.1, Safari 13.0.5, iOS 13.3.1 and iPadOS 13.3.1. A DOM object context may not have had a unique security origin.</Note>
    </Notes>
    <CVE>CVE-2020-3864</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-32bit-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwebkit2gtk-4_0-37-32bit-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwebkit2gtk3-lang-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:webkit-jsc-4-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:webkit2gtk3-devel-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.26.4-lp151.2.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOF6TVHJ47XHC6EPRQMZJI47W7QNTVVH/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-3864.html</URL>
        <Description>CVE-2020-3864</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1163809</URL>
        <Description>SUSE Bug 1163809</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1, Safari 13.0.5, iTunes for Windows 12.10.4, iCloud for Windows 11.0, iCloud for Windows 7.17. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2020-3865</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-32bit-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwebkit2gtk-4_0-37-32bit-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwebkit2gtk3-lang-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:webkit-jsc-4-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:webkit2gtk3-devel-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.26.4-lp151.2.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOF6TVHJ47XHC6EPRQMZJI47W7QNTVVH/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-3865.html</URL>
        <Description>CVE-2020-3865</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1163809</URL>
        <Description>SUSE Bug 1163809</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A logic issue was addressed with improved state management. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1, Safari 13.0.5, iTunes for Windows 12.10.4, iCloud for Windows 11.0, iCloud for Windows 7.17. Processing maliciously crafted web content may lead to universal cross site scripting.</Note>
    </Notes>
    <CVE>CVE-2020-3867</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-32bit-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwebkit2gtk-4_0-37-32bit-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwebkit2gtk3-lang-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:webkit-jsc-4-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:webkit2gtk3-devel-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.26.4-lp151.2.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOF6TVHJ47XHC6EPRQMZJI47W7QNTVVH/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-3867.html</URL>
        <Description>CVE-2020-3867</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1163809</URL>
        <Description>SUSE Bug 1163809</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1, Safari 13.0.5, iTunes for Windows 12.10.4, iCloud for Windows 11.0, iCloud for Windows 7.17. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2020-3868</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libjavascriptcoregtk-4_0-18-32bit-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwebkit2gtk-4_0-37-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwebkit2gtk-4_0-37-32bit-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:libwebkit2gtk3-lang-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:typelib-1_0-JavaScriptCore-4_0-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:typelib-1_0-WebKit2-4_0-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:typelib-1_0-WebKit2WebExtension-4_0-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:webkit-jsc-4-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:webkit2gtk-4_0-injected-bundles-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:webkit2gtk3-devel-2.26.4-lp151.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.1:webkit2gtk3-minibrowser-2.26.4-lp151.2.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VOF6TVHJ47XHC6EPRQMZJI47W7QNTVVH/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-3868.html</URL>
        <Description>CVE-2020-3868</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1163809</URL>
        <Description>SUSE Bug 1163809</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
