<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for webkit2gtk3</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2021:1369-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2021-10-18T12:13:24Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-10-18T12:13:24Z</InitialReleaseDate>
    <CurrentReleaseDate>2021-10-18T12:13:24Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for webkit2gtk3</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for webkit2gtk3 fixes the following issues:

- Update to version 2.32.4
- CVE-2021-30858: Fixed a security bug that could allow maliciously crafted web content to achieve arbitrary code execution. (bsc#1190701)
- CVE-2021-21806: Fixed an exploitable use-after-free vulnerability via specially crafted HTML web page. (bsc#1188697)

This update was imported from the SUSE:SLE-15-SP2:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2021-1369</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X4HF2CMDLYL7MPNIXI64QMEMC75KZUZA/</URL>
      <Description>E-Mail link for openSUSE-SU-2021:1369-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1188697</URL>
      <Description>SUSE Bug 1188697</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1190701</URL>
      <Description>SUSE Bug 1190701</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-21806/</URL>
      <Description>SUSE CVE CVE-2021-21806 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-30858/</URL>
      <Description>SUSE CVE CVE-2021-30858 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.2">
      <Branch Type="Product Name" Name="openSUSE Leap 15.2">
        <FullProductName ProductID="openSUSE Leap 15.2" CPE="cpe:/o:opensuse:leap:15.2">openSUSE Leap 15.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.19.1">
      <FullProductName ProductID="libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.19.1">libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-4_0-18-32bit-2.32.4-lp152.2.19.1">
      <FullProductName ProductID="libjavascriptcoregtk-4_0-18-32bit-2.32.4-lp152.2.19.1">libjavascriptcoregtk-4_0-18-32bit-2.32.4-lp152.2.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk-4_0-37-2.32.4-lp152.2.19.1">
      <FullProductName ProductID="libwebkit2gtk-4_0-37-2.32.4-lp152.2.19.1">libwebkit2gtk-4_0-37-2.32.4-lp152.2.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk-4_0-37-32bit-2.32.4-lp152.2.19.1">
      <FullProductName ProductID="libwebkit2gtk-4_0-37-32bit-2.32.4-lp152.2.19.1">libwebkit2gtk-4_0-37-32bit-2.32.4-lp152.2.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk3-lang-2.32.4-lp152.2.19.1">
      <FullProductName ProductID="libwebkit2gtk3-lang-2.32.4-lp152.2.19.1">libwebkit2gtk3-lang-2.32.4-lp152.2.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.19.1">
      <FullProductName ProductID="typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.19.1">typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.19.1">
      <FullProductName ProductID="typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.19.1">typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.19.1">
      <FullProductName ProductID="typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.19.1">typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit-jsc-4-2.32.4-lp152.2.19.1">
      <FullProductName ProductID="webkit-jsc-4-2.32.4-lp152.2.19.1">webkit-jsc-4-2.32.4-lp152.2.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.19.1">
      <FullProductName ProductID="webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.19.1">webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk3-devel-2.32.4-lp152.2.19.1">
      <FullProductName ProductID="webkit2gtk3-devel-2.32.4-lp152.2.19.1">webkit2gtk3-devel-2.32.4-lp152.2.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk3-minibrowser-2.32.4-lp152.2.19.1">
      <FullProductName ProductID="webkit2gtk3-minibrowser-2.32.4-lp152.2.19.1">webkit2gtk3-minibrowser-2.32.4-lp152.2.19.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.19.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.19.1">libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.19.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libjavascriptcoregtk-4_0-18-32bit-2.32.4-lp152.2.19.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.4-lp152.2.19.1">libjavascriptcoregtk-4_0-18-32bit-2.32.4-lp152.2.19.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk-4_0-37-2.32.4-lp152.2.19.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.4-lp152.2.19.1">libwebkit2gtk-4_0-37-2.32.4-lp152.2.19.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk-4_0-37-32bit-2.32.4-lp152.2.19.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.4-lp152.2.19.1">libwebkit2gtk-4_0-37-32bit-2.32.4-lp152.2.19.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk3-lang-2.32.4-lp152.2.19.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.4-lp152.2.19.1">libwebkit2gtk3-lang-2.32.4-lp152.2.19.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.19.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.19.1">typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.19.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.19.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.19.1">typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.19.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.19.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.19.1">typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.19.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit-jsc-4-2.32.4-lp152.2.19.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:webkit-jsc-4-2.32.4-lp152.2.19.1">webkit-jsc-4-2.32.4-lp152.2.19.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.19.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.19.1">webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.19.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk3-devel-2.32.4-lp152.2.19.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:webkit2gtk3-devel-2.32.4-lp152.2.19.1">webkit2gtk3-devel-2.32.4-lp152.2.19.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk3-minibrowser-2.32.4-lp152.2.19.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.4-lp152.2.19.1">webkit2gtk3-minibrowser-2.32.4-lp152.2.19.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.3 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in remote code execution. The victim needs to visit a malicious web site to trigger the vulnerability.</Note>
    </Notes>
    <CVE>CVE-2021-21806</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.4-lp152.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.4-lp152.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.4-lp152.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.4-lp152.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit-jsc-4-2.32.4-lp152.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-devel-2.32.4-lp152.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.4-lp152.2.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X4HF2CMDLYL7MPNIXI64QMEMC75KZUZA/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-21806.html</URL>
        <Description>CVE-2021-21806</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188294</URL>
        <Description>SUSE Bug 1188294</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188697</URL>
        <Description>SUSE Bug 1188697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.</Note>
    </Notes>
    <CVE>CVE-2021-30858</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-2.32.4-lp152.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libjavascriptcoregtk-4_0-18-32bit-2.32.4-lp152.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-2.32.4-lp152.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk-4_0-37-32bit-2.32.4-lp152.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.2:libwebkit2gtk3-lang-2.32.4-lp152.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-JavaScriptCore-4_0-2.32.4-lp152.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2-4_0-2.32.4-lp152.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.2:typelib-1_0-WebKit2WebExtension-4_0-2.32.4-lp152.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit-jsc-4-2.32.4-lp152.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk-4_0-injected-bundles-2.32.4-lp152.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-devel-2.32.4-lp152.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.2:webkit2gtk3-minibrowser-2.32.4-lp152.2.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/X4HF2CMDLYL7MPNIXI64QMEMC75KZUZA/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-30858.html</URL>
        <Description>CVE-2021-30858</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1190701</URL>
        <Description>SUSE Bug 1190701</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191298</URL>
        <Description>SUSE Bug 1191298</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191301</URL>
        <Description>SUSE Bug 1191301</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
