<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for webkit2gtk3</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:2285-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-08-09T20:45:50Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-08-09T20:45:50Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-08-09T20:45:50Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for webkit2gtk3</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for webkit2gtk3 to version 2.20.3 fixes the following issues:

These security issues were fixed:

- CVE-2018-4190: An unspecified issue allowed remote attackers to obtain
  sensitive credential information that is transmitted during a CSS mask-image
  fetch (bsc#1097693).
- CVE-2018-4199: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (buffer overflow and application
  crash) via a crafted web site (bsc#1097693) 
- CVE-2018-4218: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site that triggers an @generatorState use-after-free
  (bsc#1097693) 
- CVE-2018-4222: An unspecified issue allowed remote attackers to execute
  arbitrary code via a crafted web site that leverages a getWasmBufferFromValue
  out-of-bounds read during WebAssembly compilation (bsc#1097693) 
- CVE-2018-4232: An unspecified issue allowed remote attackers to overwrite
  cookies via a crafted web site (bsc#1097693) 
- CVE-2018-4233: An unspecified issue allowed remote attackers to execute
  arbitrary code or cause a denial of service (memory corruption and application
  crash) via a crafted web site (bsc#1097693) 
- CVE-2018-11646: webkitFaviconDatabaseSetIconForPageURL and
  webkitFaviconDatabaseSetIconURLForPageURL mishandle an unset pageURL, leading
  to an application crash (bsc#1095611).

These non-security issues were fixed:

- Disable Gigacage if mmap fails to allocate in Linux.
- Add user agent quirk for paypal website.
- Fix a network process crash when trying to get cookies of about:blank page.
- Fix UI process crash when closing the window under Wayland.
- Fix several crashes and rendering issues.
  
This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-security-announce/2018-08/msg00031.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:2285-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.0">
      <Branch Type="Product Name" Name="openSUSE Leap 15.0">
        <FullProductName ProductID="openSUSE Leap 15.0">openSUSE Leap 15.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-4_0-18-2.20.3-lp150.2.3.1">
      <FullProductName ProductID="libjavascriptcoregtk-4_0-18-2.20.3-lp150.2.3.1">libjavascriptcoregtk-4_0-18-2.20.3-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-4_0-18-32bit-2.20.3-lp150.2.3.1">
      <FullProductName ProductID="libjavascriptcoregtk-4_0-18-32bit-2.20.3-lp150.2.3.1">libjavascriptcoregtk-4_0-18-32bit-2.20.3-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk-4_0-37-2.20.3-lp150.2.3.1">
      <FullProductName ProductID="libwebkit2gtk-4_0-37-2.20.3-lp150.2.3.1">libwebkit2gtk-4_0-37-2.20.3-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk-4_0-37-32bit-2.20.3-lp150.2.3.1">
      <FullProductName ProductID="libwebkit2gtk-4_0-37-32bit-2.20.3-lp150.2.3.1">libwebkit2gtk-4_0-37-32bit-2.20.3-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk3-lang-2.20.3-lp150.2.3.1">
      <FullProductName ProductID="libwebkit2gtk3-lang-2.20.3-lp150.2.3.1">libwebkit2gtk3-lang-2.20.3-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-JavaScriptCore-4_0-2.20.3-lp150.2.3.1">
      <FullProductName ProductID="typelib-1_0-JavaScriptCore-4_0-2.20.3-lp150.2.3.1">typelib-1_0-JavaScriptCore-4_0-2.20.3-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit2-4_0-2.20.3-lp150.2.3.1">
      <FullProductName ProductID="typelib-1_0-WebKit2-4_0-2.20.3-lp150.2.3.1">typelib-1_0-WebKit2-4_0-2.20.3-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit2WebExtension-4_0-2.20.3-lp150.2.3.1">
      <FullProductName ProductID="typelib-1_0-WebKit2WebExtension-4_0-2.20.3-lp150.2.3.1">typelib-1_0-WebKit2WebExtension-4_0-2.20.3-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit-jsc-4-2.20.3-lp150.2.3.1">
      <FullProductName ProductID="webkit-jsc-4-2.20.3-lp150.2.3.1">webkit-jsc-4-2.20.3-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk-4_0-injected-bundles-2.20.3-lp150.2.3.1">
      <FullProductName ProductID="webkit2gtk-4_0-injected-bundles-2.20.3-lp150.2.3.1">webkit2gtk-4_0-injected-bundles-2.20.3-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk3-2.20.3-lp150.2.3.1">
      <FullProductName ProductID="webkit2gtk3-2.20.3-lp150.2.3.1">webkit2gtk3-2.20.3-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk3-devel-2.20.3-lp150.2.3.1">
      <FullProductName ProductID="webkit2gtk3-devel-2.20.3-lp150.2.3.1">webkit2gtk3-devel-2.20.3-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk3-plugin-process-gtk2-2.20.3-lp150.2.3.1">
      <FullProductName ProductID="webkit2gtk3-plugin-process-gtk2-2.20.3-lp150.2.3.1">webkit2gtk3-plugin-process-gtk2-2.20.3-lp150.2.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libjavascriptcoregtk-4_0-18-2.20.3-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.20.3-lp150.2.3.1">libjavascriptcoregtk-4_0-18-2.20.3-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libjavascriptcoregtk-4_0-18-32bit-2.20.3-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.20.3-lp150.2.3.1">libjavascriptcoregtk-4_0-18-32bit-2.20.3-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk-4_0-37-2.20.3-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.20.3-lp150.2.3.1">libwebkit2gtk-4_0-37-2.20.3-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk-4_0-37-32bit-2.20.3-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.20.3-lp150.2.3.1">libwebkit2gtk-4_0-37-32bit-2.20.3-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk3-lang-2.20.3-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:libwebkit2gtk3-lang-2.20.3-lp150.2.3.1">libwebkit2gtk3-lang-2.20.3-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-JavaScriptCore-4_0-2.20.3-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.20.3-lp150.2.3.1">typelib-1_0-JavaScriptCore-4_0-2.20.3-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-WebKit2-4_0-2.20.3-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.20.3-lp150.2.3.1">typelib-1_0-WebKit2-4_0-2.20.3-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-WebKit2WebExtension-4_0-2.20.3-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.20.3-lp150.2.3.1">typelib-1_0-WebKit2WebExtension-4_0-2.20.3-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit-jsc-4-2.20.3-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:webkit-jsc-4-2.20.3-lp150.2.3.1">webkit-jsc-4-2.20.3-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk-4_0-injected-bundles-2.20.3-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.20.3-lp150.2.3.1">webkit2gtk-4_0-injected-bundles-2.20.3-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk3-2.20.3-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:webkit2gtk3-2.20.3-lp150.2.3.1">webkit2gtk3-2.20.3-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk3-devel-2.20.3-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:webkit2gtk3-devel-2.20.3-lp150.2.3.1">webkit2gtk3-devel-2.20.3-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk3-plugin-process-gtk2-2.20.3-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.20.3-lp150.2.3.1">webkit2gtk3-plugin-process-gtk2-2.20.3-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">webkitFaviconDatabaseSetIconForPageURL and webkitFaviconDatabaseSetIconURLForPageURL in UIProcess/API/glib/WebKitFaviconDatabase.cpp in WebKit, as used in WebKitGTK+ through 2.21.3, mishandle an unset pageURL, leading to an application crash.</Note>
    </Notes>
    <CVE>CVE-2018-11646</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.20.3-lp150.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-08/msg00031.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-11646.html</URL>
        <Description>CVE-2018-11646</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1095611</URL>
        <Description>SUSE Bug 1095611</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097693</URL>
        <Description>SUSE Bug 1097693</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to obtain sensitive credential information that is transmitted during a CSS mask-image fetch.</Note>
    </Notes>
    <CVE>CVE-2018-4190</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.20.3-lp150.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-08/msg00031.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4190.html</URL>
        <Description>CVE-2018-4190</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097693</URL>
        <Description>SUSE Bug 1097693</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2018-4199</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.20.3-lp150.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-08/msg00031.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4199.html</URL>
        <Description>CVE-2018-4199</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097693</URL>
        <Description>SUSE Bug 1097693</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site that triggers an @generatorState use-after-free.</Note>
    </Notes>
    <CVE>CVE-2018-4218</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.20.3-lp150.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-08/msg00031.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4218.html</URL>
        <Description>CVE-2018-4218</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097693</URL>
        <Description>SUSE Bug 1097693</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code via a crafted web site that leverages a getWasmBufferFromValue out-of-bounds read during WebAssembly compilation.</Note>
    </Notes>
    <CVE>CVE-2018-4222</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.20.3-lp150.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-08/msg00031.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4222.html</URL>
        <Description>CVE-2018-4222</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097693</URL>
        <Description>SUSE Bug 1097693</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to overwrite cookies via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2018-4232</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.20.3-lp150.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-08/msg00031.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4232.html</URL>
        <Description>CVE-2018-4232</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097693</URL>
        <Description>SUSE Bug 1097693</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2018-4233</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libjavascriptcoregtk-4_0-18-32bit-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk-4_0-37-32bit-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:libwebkit2gtk3-lang-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-JavaScriptCore-4_0-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2-4_0-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:typelib-1_0-WebKit2WebExtension-4_0-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit-jsc-4-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk-4_0-injected-bundles-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-devel-2.20.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:webkit2gtk3-plugin-process-gtk2-2.20.3-lp150.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-08/msg00031.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-4233.html</URL>
        <Description>CVE-2018-4233</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097693</URL>
        <Description>SUSE Bug 1097693</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
