<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for webkit2gtk3</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2021:0637-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2021-04-30T19:23:01Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-04-30T19:23:01Z</InitialReleaseDate>
    <CurrentReleaseDate>2021-04-30T19:23:01Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for webkit2gtk3</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for webkit2gtk3 fixes the following issues:

- Update to version 2.32.0 (bsc#1184155):
  * Fix the authentication request port when URL omits the port.
  * Fix iframe scrolling when main frame is scrolled in async
  * scrolling mode.
  * Stop using g_memdup.
  * Show a warning message when overriding signal handler for
  * threading suspension.
  * Fix the build on RISC-V with GCC 11.
  * Fix several crashes and rendering issues.
  * Security fixes: CVE-2021-1788, CVE-2021-1844, CVE-2021-1871
- Update in version 2.30.6 (bsc#1184262):
  * Update user agent quirks again for Google Docs and Google Drive.
  * Fix several crashes and rendering issues.
  * Security fixes: CVE-2020-27918, CVE-2020-29623, CVE-2021-1765
    CVE-2021-1789, CVE-2021-1799, CVE-2021-1801, CVE-2021-1870.
- Update _constraints for armv6/armv7 (bsc#1182719)
- restore NPAPI plugin support which was removed in 2.32.0

This update was imported from the SUSE:SLE-15-SP2:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2021-637</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLZ5MXMQE5PW2OZS4ZK2IAEG3Y3AFJVD/</URL>
      <Description>E-Mail link for openSUSE-SU-2021:0637-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1182719</URL>
      <Description>SUSE Bug 1182719</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184155</URL>
      <Description>SUSE Bug 1184155</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184262</URL>
      <Description>SUSE Bug 1184262</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-27918/</URL>
      <Description>SUSE CVE CVE-2020-27918 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-29623/</URL>
      <Description>SUSE CVE CVE-2020-29623 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-1765/</URL>
      <Description>SUSE CVE CVE-2021-1765 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-1788/</URL>
      <Description>SUSE CVE CVE-2021-1788 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-1789/</URL>
      <Description>SUSE CVE CVE-2021-1789 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-1799/</URL>
      <Description>SUSE CVE CVE-2021-1799 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-1801/</URL>
      <Description>SUSE CVE CVE-2021-1801 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-1844/</URL>
      <Description>SUSE CVE CVE-2021-1844 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-1870/</URL>
      <Description>SUSE CVE CVE-2021-1870 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-1871/</URL>
      <Description>SUSE CVE CVE-2021-1871 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.2">
      <Branch Type="Product Name" Name="openSUSE Leap 15.2">
        <FullProductName ProductID="openSUSE Leap 15.2" CPE="cpe:/o:opensuse:leap:15.2">openSUSE Leap 15.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-4_0-18-2.32.0-lp152.2.13.1">
      <FullProductName ProductID="libjavascriptcoregtk-4_0-18-2.32.0-lp152.2.13.1">libjavascriptcoregtk-4_0-18-2.32.0-lp152.2.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-4_0-18-32bit-2.32.0-lp152.2.13.1">
      <FullProductName ProductID="libjavascriptcoregtk-4_0-18-32bit-2.32.0-lp152.2.13.1">libjavascriptcoregtk-4_0-18-32bit-2.32.0-lp152.2.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk-4_0-37-2.32.0-lp152.2.13.1">
      <FullProductName ProductID="libwebkit2gtk-4_0-37-2.32.0-lp152.2.13.1">libwebkit2gtk-4_0-37-2.32.0-lp152.2.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk-4_0-37-32bit-2.32.0-lp152.2.13.1">
      <FullProductName ProductID="libwebkit2gtk-4_0-37-32bit-2.32.0-lp152.2.13.1">libwebkit2gtk-4_0-37-32bit-2.32.0-lp152.2.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk3-lang-2.32.0-lp152.2.13.1">
      <FullProductName ProductID="libwebkit2gtk3-lang-2.32.0-lp152.2.13.1">libwebkit2gtk3-lang-2.32.0-lp152.2.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-JavaScriptCore-4_0-2.32.0-lp152.2.13.1">
      <FullProductName ProductID="typelib-1_0-JavaScriptCore-4_0-2.32.0-lp152.2.13.1">typelib-1_0-JavaScriptCore-4_0-2.32.0-lp152.2.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit2-4_0-2.32.0-lp152.2.13.1">
      <FullProductName ProductID="typelib-1_0-WebKit2-4_0-2.32.0-lp152.2.13.1">typelib-1_0-WebKit2-4_0-2.32.0-lp152.2.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit2WebExtension-4_0-2.32.0-lp152.2.13.1">
      <FullProductName ProductID="typelib-1_0-WebKit2WebExtension-4_0-2.32.0-lp152.2.13.1">typelib-1_0-WebKit2WebExtension-4_0-2.32.0-lp152.2.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit-jsc-4-2.32.0-lp152.2.13.1">
      <FullProductName ProductID="webkit-jsc-4-2.32.0-lp152.2.13.1">webkit-jsc-4-2.32.0-lp152.2.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk-4_0-injected-bundles-2.32.0-lp152.2.13.1">
      <FullProductName ProductID="webkit2gtk-4_0-injected-bundles-2.32.0-lp152.2.13.1">webkit2gtk-4_0-injected-bundles-2.32.0-lp152.2.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk3-devel-2.32.0-lp152.2.13.1">
      <FullProductName ProductID="webkit2gtk3-devel-2.32.0-lp152.2.13.1">webkit2gtk3-devel-2.32.0-lp152.2.13.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk3-minibrowser-2.32.0-lp152.2.13.1">
      <FullProductName ProductID="webkit2gtk3-minibrowser-2.32.0-lp152.2.13.1">webkit2gtk3-minibrowser-2.32.0-lp152.2.13.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libjavascriptcoregtk-4_0-18-2.32.0-lp152.2.13.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.0-lp152.2.13.1">libjavascriptcoregtk-4_0-18-2.32.0-lp152.2.13.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libjavascriptcoregtk-4_0-18-32bit-2.32.0-lp152.2.13.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.0-lp152.2.13.1">libjavascriptcoregtk-4_0-18-32bit-2.32.0-lp152.2.13.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk-4_0-37-2.32.0-lp152.2.13.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.0-lp152.2.13.1">libwebkit2gtk-4_0-37-2.32.0-lp152.2.13.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk-4_0-37-32bit-2.32.0-lp152.2.13.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.0-lp152.2.13.1">libwebkit2gtk-4_0-37-32bit-2.32.0-lp152.2.13.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk3-lang-2.32.0-lp152.2.13.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.0-lp152.2.13.1">libwebkit2gtk3-lang-2.32.0-lp152.2.13.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-JavaScriptCore-4_0-2.32.0-lp152.2.13.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.0-lp152.2.13.1">typelib-1_0-JavaScriptCore-4_0-2.32.0-lp152.2.13.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-WebKit2-4_0-2.32.0-lp152.2.13.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.0-lp152.2.13.1">typelib-1_0-WebKit2-4_0-2.32.0-lp152.2.13.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-WebKit2WebExtension-4_0-2.32.0-lp152.2.13.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.0-lp152.2.13.1">typelib-1_0-WebKit2WebExtension-4_0-2.32.0-lp152.2.13.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit-jsc-4-2.32.0-lp152.2.13.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:webkit-jsc-4-2.32.0-lp152.2.13.1">webkit-jsc-4-2.32.0-lp152.2.13.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk-4_0-injected-bundles-2.32.0-lp152.2.13.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.0-lp152.2.13.1">webkit2gtk-4_0-injected-bundles-2.32.0-lp152.2.13.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk3-devel-2.32.0-lp152.2.13.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:webkit2gtk3-devel-2.32.0-lp152.2.13.1">webkit2gtk3-devel-2.32.0-lp152.2.13.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk3-minibrowser-2.32.0-lp152.2.13.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.0-lp152.2.13.1">webkit2gtk3-minibrowser-2.32.0-lp152.2.13.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 14.2 and iPadOS 14.2, iCloud for Windows 11.5, Safari 14.0.1, tvOS 14.2, iTunes 12.11 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2020-27918</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit-jsc-4-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-devel-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.0-lp152.2.13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLZ5MXMQE5PW2OZS4ZK2IAEG3Y3AFJVD/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-27918.html</URL>
        <Description>CVE-2020-27918</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184262</URL>
        <Description>SUSE Bug 1184262</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">"Clear History and Website Data" did not clear the history. The issue was addressed with improved data deletion. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3 and iPadOS 14.3, tvOS 14.3. A user may be unable to fully delete browsing history.</Note>
    </Notes>
    <CVE>CVE-2020-29623</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit-jsc-4-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-devel-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.0-lp152.2.13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLZ5MXMQE5PW2OZS4ZK2IAEG3Y3AFJVD/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-29623.html</URL>
        <Description>CVE-2020-29623</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184262</URL>
        <Description>SUSE Bug 1184262</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave. Maliciously crafted web content may violate iframe sandboxing policy.</Note>
    </Notes>
    <CVE>CVE-2021-1765</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit-jsc-4-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-devel-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.0-lp152.2.13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLZ5MXMQE5PW2OZS4ZK2IAEG3Y3AFJVD/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-1765.html</URL>
        <Description>CVE-2021-1765</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184262</URL>
        <Description>SUSE Bug 1184262</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.4, watchOS 7.3, iOS 14.4 and iPadOS 14.4, Safari 14.0.3. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2021-1788</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit-jsc-4-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-devel-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.0-lp152.2.13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLZ5MXMQE5PW2OZS4ZK2IAEG3Y3AFJVD/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-1788.html</URL>
        <Description>CVE-2021-1788</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184155</URL>
        <Description>SUSE Bug 1184155</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A type confusion issue was addressed with improved state handling. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.4, watchOS 7.3, iOS 14.4 and iPadOS 14.4, Safari 14.0.3. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2021-1789</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit-jsc-4-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-devel-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.0-lp152.2.13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLZ5MXMQE5PW2OZS4ZK2IAEG3Y3AFJVD/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-1789.html</URL>
        <Description>CVE-2021-1789</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184262</URL>
        <Description>SUSE Bug 1184262</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A port redirection issue was addressed with additional port validation. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, tvOS 14.4, watchOS 7.3, iOS 14.4 and iPadOS 14.4, Safari 14.0.3. A malicious website may be able to access restricted ports on arbitrary servers.</Note>
    </Notes>
    <CVE>CVE-2021-1799</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit-jsc-4-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-devel-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.0-lp152.2.13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLZ5MXMQE5PW2OZS4ZK2IAEG3Y3AFJVD/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-1799.html</URL>
        <Description>CVE-2021-1799</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184262</URL>
        <Description>SUSE Bug 1184262</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. Maliciously crafted web content may violate iframe sandboxing policy.</Note>
    </Notes>
    <CVE>CVE-2021-1801</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit-jsc-4-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-devel-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.0-lp152.2.13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLZ5MXMQE5PW2OZS4ZK2IAEG3Y3AFJVD/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-1801.html</URL>
        <Description>CVE-2021-1801</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184262</URL>
        <Description>SUSE Bug 1184262</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 14.4.1 and iPadOS 14.4.1, Safari 14.0.3 (v. 14610.4.3.1.7 and 15610.4.3.1.7), watchOS 7.3.2, macOS Big Sur 11.2.3. Processing maliciously crafted web content may lead to arbitrary code execution.</Note>
    </Notes>
    <CVE>CVE-2021-1844</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit-jsc-4-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-devel-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.0-lp152.2.13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLZ5MXMQE5PW2OZS4ZK2IAEG3Y3AFJVD/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-1844.html</URL>
        <Description>CVE-2021-1844</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184155</URL>
        <Description>SUSE Bug 1184155</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, iOS 14.4 and iPadOS 14.4. A remote attacker may be able to cause arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..</Note>
    </Notes>
    <CVE>CVE-2021-1870</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit-jsc-4-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-devel-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.0-lp152.2.13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLZ5MXMQE5PW2OZS4ZK2IAEG3Y3AFJVD/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-1870.html</URL>
        <Description>CVE-2021-1870</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184262</URL>
        <Description>SUSE Bug 1184262</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, iOS 14.4 and iPadOS 14.4. A remote attacker may be able to cause arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..</Note>
    </Notes>
    <CVE>CVE-2021-1871</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit-jsc-4-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-devel-2.32.0-lp152.2.13.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.0-lp152.2.13.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PLZ5MXMQE5PW2OZS4ZK2IAEG3Y3AFJVD/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-1871.html</URL>
        <Description>CVE-2021-1871</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1184155</URL>
        <Description>SUSE Bug 1184155</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
