<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for webkit2gtk3</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2018:2075-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-07-26T14:34:55Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-07-26T14:34:55Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-07-26T14:34:55Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for webkit2gtk3</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for webkit2gtk3 to version 2.20.3 fixes the following issues:

These security issues were fixed:

- CVE-2018-4190: An unspecified issue allowed remote attackers to obtain
  sensitive credential information that is transmitted during a CSS mask-image
  fetch (bsc#1097693).
- CVE-2018-4199: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (buffer overflow and application
  crash) via a crafted web site (bsc#1097693) 
- CVE-2018-4218: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site that triggers an @generatorState use-after-free
  (bsc#1097693) 
- CVE-2018-4222: An unspecified issue allowed remote attackers to execute
  arbitrary code via a crafted web site that leverages a getWasmBufferFromValue
  out-of-bounds read during WebAssembly compilation (bsc#1097693) 
- CVE-2018-4232: An unspecified issue allowed remote attackers to overwrite
  cookies via a crafted web site (bsc#1097693) 
- CVE-2018-4233: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1097693) 
- CVE-2018-11646: webkitFaviconDatabaseSetIconForPageURL and
  webkitFaviconDatabaseSetIconURLForPageURL mishandle an unset pageURL, leading
  to an application crash (bsc#1095611).

These non-security issues were fixed:

- Disable Gigacage if mmap fails to allocate in Linux.
- Add user agent quirk for paypal website.
- Fix a network process crash when trying to get cookies of about:blank page.
- Fix UI process crash when closing the window under Wayland.
- Fix several crashes and rendering issues.
  </Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-Module-Basesystem-15-2018-1401,SUSE-SLE-Module-Desktop-Applications-15-2018-1401</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182075-1/</URL>
      <Description>Link for SUSE-SU-2018:2075-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2018-July/004321.html</URL>
      <Description>E-Mail link for SUSE-SU-2018:2075-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1095611</URL>
      <Description>SUSE Bug 1095611</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1097693</URL>
      <Description>SUSE Bug 1097693</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-11646/</URL>
      <Description>SUSE CVE CVE-2018-11646 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4190/</URL>
      <Description>SUSE CVE CVE-2018-4190 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4199/</URL>
      <Description>SUSE CVE CVE-2018-4199 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4218/</URL>
      <Description>SUSE CVE CVE-2018-4218 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4222/</URL>
      <Description>SUSE CVE CVE-2018-4222 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4232/</URL>
      <Description>SUSE CVE CVE-2018-4232 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-4233/</URL>
      <Description>SUSE CVE CVE-2018-4233 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Basesystem 15">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Basesystem 15">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15" CPE="cpe:/o:suse:sle-module-basesystem:15">SUSE Linux Enterprise Module for Basesystem 15</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Desktop Applications 15">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Desktop Applications 15">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Desktop Applications 15" CPE="cpe:/o:suse:sle-module-desktop-applications:15">SUSE Linux Enterprise Module for Desktop Applications 15</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-4_0-18-2.20.3-3.3.1">
      <FullProductName ProductID="libjavascriptcoregtk-4_0-18-2.20.3-3.3.1">libjavascriptcoregtk-4_0-18-2.20.3-3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk-4_0-37-2.20.3-3.3.1">
      <FullProductName ProductID="libwebkit2gtk-4_0-37-2.20.3-3.3.1">libwebkit2gtk-4_0-37-2.20.3-3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk3-lang-2.20.3-3.3.1">
      <FullProductName ProductID="libwebkit2gtk3-lang-2.20.3-3.3.1">libwebkit2gtk3-lang-2.20.3-3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk-4_0-injected-bundles-2.20.3-3.3.1">
      <FullProductName ProductID="webkit2gtk-4_0-injected-bundles-2.20.3-3.3.1">webkit2gtk-4_0-injected-bundles-2.20.3-3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-JavaScriptCore-4_0-2.20.3-3.3.1">
      <FullProductName ProductID="typelib-1_0-JavaScriptCore-4_0-2.20.3-3.3.1">typelib-1_0-JavaScriptCore-4_0-2.20.3-3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit2-4_0-2.20.3-3.3.1">
      <FullProductName ProductID="typelib-1_0-WebKit2-4_0-2.20.3-3.3.1">typelib-1_0-WebKit2-4_0-2.20.3-3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit2WebExtension-4_0-2.20.3-3.3.1">
      <FullProductName ProductID="typelib-1_0-WebKit2WebExtension-4_0-2.20.3-3.3.1">typelib-1_0-WebKit2WebExtension-4_0-2.20.3-3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk3-devel-2.20.3-3.3.1">
      <FullProductName ProductID="webkit2gtk3-devel-2.20.3-3.3.1">webkit2gtk3-devel-2.20.3-3.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libjavascriptcoregtk-4_0-18-2.20.3-3.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15:libjavascriptcoregtk-4_0-18-2.20.3-3.3.1">libjavascriptcoregtk-4_0-18-2.20.3-3.3.1 as a component of SUSE Linux Enterprise Module for Basesystem 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk-4_0-37-2.20.3-3.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk-4_0-37-2.20.3-3.3.1">libwebkit2gtk-4_0-37-2.20.3-3.3.1 as a component of SUSE Linux Enterprise Module for Basesystem 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk3-lang-2.20.3-3.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk3-lang-2.20.3-3.3.1">libwebkit2gtk3-lang-2.20.3-3.3.1 as a component of SUSE Linux Enterprise Module for Basesystem 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk-4_0-injected-bundles-2.20.3-3.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Basesystem 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Basesystem 15:webkit2gtk-4_0-injected-bundles-2.20.3-3.3.1">webkit2gtk-4_0-injected-bundles-2.20.3-3.3.1 as a component of SUSE Linux Enterprise Module for Basesystem 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-JavaScriptCore-4_0-2.20.3-3.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Desktop Applications 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-JavaScriptCore-4_0-2.20.3-3.3.1">typelib-1_0-JavaScriptCore-4_0-2.20.3-3.3.1 as a component of SUSE Linux Enterprise Module for Desktop Applications 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-WebKit2-4_0-2.20.3-3.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Desktop Applications 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2-4_0-2.20.3-3.3.1">typelib-1_0-WebKit2-4_0-2.20.3-3.3.1 as a component of SUSE Linux Enterprise Module for Desktop Applications 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-WebKit2WebExtension-4_0-2.20.3-3.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Desktop Applications 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2WebExtension-4_0-2.20.3-3.3.1">typelib-1_0-WebKit2WebExtension-4_0-2.20.3-3.3.1 as a component of SUSE Linux Enterprise Module for Desktop Applications 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk3-devel-2.20.3-3.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Desktop Applications 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Desktop Applications 15:webkit2gtk3-devel-2.20.3-3.3.1">webkit2gtk3-devel-2.20.3-3.3.1 as a component of SUSE Linux Enterprise Module for Desktop Applications 15</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">webkitFaviconDatabaseSetIconForPageURL and webkitFaviconDatabaseSetIconURLForPageURL in UIProcess/API/glib/WebKitFaviconDatabase.cpp in WebKit, as used in WebKitGTK+ through 2.21.3, mishandle an unset pageURL, leading to an application crash.</Note>
    </Notes>
    <CVE>CVE-2018-11646</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libjavascriptcoregtk-4_0-18-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk-4_0-37-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk3-lang-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:webkit2gtk-4_0-injected-bundles-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-JavaScriptCore-4_0-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2-4_0-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2WebExtension-4_0-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:webkit2gtk3-devel-2.20.3-3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182075-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-11646.html</URL>
        <Description>CVE-2018-11646</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1095611</URL>
        <Description>SUSE Bug 1095611</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097693</URL>
        <Description>SUSE Bug 1097693</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to obtain sensitive credential information that is transmitted during a CSS mask-image fetch.</Note>
    </Notes>
    <CVE>CVE-2018-4190</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libjavascriptcoregtk-4_0-18-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk-4_0-37-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk3-lang-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:webkit2gtk-4_0-injected-bundles-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-JavaScriptCore-4_0-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2-4_0-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2WebExtension-4_0-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:webkit2gtk3-devel-2.20.3-3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182075-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4190.html</URL>
        <Description>CVE-2018-4190</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097693</URL>
        <Description>SUSE Bug 1097693</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2018-4199</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libjavascriptcoregtk-4_0-18-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk-4_0-37-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk3-lang-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:webkit2gtk-4_0-injected-bundles-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-JavaScriptCore-4_0-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2-4_0-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2WebExtension-4_0-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:webkit2gtk3-devel-2.20.3-3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182075-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4199.html</URL>
        <Description>CVE-2018-4199</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097693</URL>
        <Description>SUSE Bug 1097693</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site that triggers an @generatorState use-after-free.</Note>
    </Notes>
    <CVE>CVE-2018-4218</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libjavascriptcoregtk-4_0-18-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk-4_0-37-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk3-lang-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:webkit2gtk-4_0-injected-bundles-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-JavaScriptCore-4_0-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2-4_0-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2WebExtension-4_0-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:webkit2gtk3-devel-2.20.3-3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182075-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4218.html</URL>
        <Description>CVE-2018-4218</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097693</URL>
        <Description>SUSE Bug 1097693</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code via a crafted web site that leverages a getWasmBufferFromValue out-of-bounds read during WebAssembly compilation.</Note>
    </Notes>
    <CVE>CVE-2018-4222</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libjavascriptcoregtk-4_0-18-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk-4_0-37-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk3-lang-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:webkit2gtk-4_0-injected-bundles-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-JavaScriptCore-4_0-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2-4_0-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2WebExtension-4_0-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:webkit2gtk3-devel-2.20.3-3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182075-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4222.html</URL>
        <Description>CVE-2018-4222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097693</URL>
        <Description>SUSE Bug 1097693</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to overwrite cookies via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2018-4232</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libjavascriptcoregtk-4_0-18-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk-4_0-37-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk3-lang-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:webkit2gtk-4_0-injected-bundles-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-JavaScriptCore-4_0-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2-4_0-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2WebExtension-4_0-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:webkit2gtk3-devel-2.20.3-3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182075-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4232.html</URL>
        <Description>CVE-2018-4232</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097693</URL>
        <Description>SUSE Bug 1097693</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2018-4233</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libjavascriptcoregtk-4_0-18-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk-4_0-37-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:libwebkit2gtk3-lang-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Basesystem 15:webkit2gtk-4_0-injected-bundles-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-JavaScriptCore-4_0-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2-4_0-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:typelib-1_0-WebKit2WebExtension-4_0-2.20.3-3.3.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:webkit2gtk3-devel-2.20.3-3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182075-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4233.html</URL>
        <Description>CVE-2018-4233</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097693</URL>
        <Description>SUSE Bug 1097693</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
