<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libQt5Pdf5-5.15.19-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2025:16593</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-09-06T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-09-06T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-09-06T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libQt5Pdf5-5.15.19-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libQt5Pdf5-5.15.19-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2025-16593</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-10229/</URL>
      <Description>SUSE CVE CVE-2024-10229 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-10827/</URL>
      <Description>SUSE CVE CVE-2024-10827 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-11477/</URL>
      <Description>SUSE CVE CVE-2024-11477 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-12694/</URL>
      <Description>SUSE CVE CVE-2024-12694 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-55549/</URL>
      <Description>SUSE CVE CVE-2024-55549 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-0436/</URL>
      <Description>SUSE CVE CVE-2025-0436 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-0762/</URL>
      <Description>SUSE CVE CVE-2025-0762 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-0996/</URL>
      <Description>SUSE CVE CVE-2025-0996 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-0999/</URL>
      <Description>SUSE CVE CVE-2025-0999 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-1426/</URL>
      <Description>SUSE CVE CVE-2025-1426 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-1919/</URL>
      <Description>SUSE CVE CVE-2025-1919 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-2136/</URL>
      <Description>SUSE CVE CVE-2025-2136 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-24201/</URL>
      <Description>SUSE CVE CVE-2025-24201 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-24855/</URL>
      <Description>SUSE CVE CVE-2025-24855 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-2783/</URL>
      <Description>SUSE CVE CVE-2025-2783 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-3619/</URL>
      <Description>SUSE CVE CVE-2025-3619 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libQt5Pdf5-5.15.19-1.1">
      <FullProductName ProductID="libQt5Pdf5-5.15.19-1.1">libQt5Pdf5-5.15.19-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libQt5PdfWidgets5-5.15.19-1.1">
      <FullProductName ProductID="libQt5PdfWidgets5-5.15.19-1.1">libQt5PdfWidgets5-5.15.19-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt5-qtpdf-devel-5.15.19-1.1">
      <FullProductName ProductID="libqt5-qtpdf-devel-5.15.19-1.1">libqt5-qtpdf-devel-5.15.19-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt5-qtpdf-examples-5.15.19-1.1">
      <FullProductName ProductID="libqt5-qtpdf-examples-5.15.19-1.1">libqt5-qtpdf-examples-5.15.19-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt5-qtpdf-imports-5.15.19-1.1">
      <FullProductName ProductID="libqt5-qtpdf-imports-5.15.19-1.1">libqt5-qtpdf-imports-5.15.19-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt5-qtpdf-private-headers-devel-5.15.19-1.1">
      <FullProductName ProductID="libqt5-qtpdf-private-headers-devel-5.15.19-1.1">libqt5-qtpdf-private-headers-devel-5.15.19-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt5-qtwebengine-5.15.19-1.1">
      <FullProductName ProductID="libqt5-qtwebengine-5.15.19-1.1">libqt5-qtwebengine-5.15.19-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt5-qtwebengine-devel-5.15.19-1.1">
      <FullProductName ProductID="libqt5-qtwebengine-devel-5.15.19-1.1">libqt5-qtwebengine-devel-5.15.19-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt5-qtwebengine-examples-5.15.19-1.1">
      <FullProductName ProductID="libqt5-qtwebengine-examples-5.15.19-1.1">libqt5-qtwebengine-examples-5.15.19-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt5-qtwebengine-private-headers-devel-5.15.19-1.1">
      <FullProductName ProductID="libqt5-qtwebengine-private-headers-devel-5.15.19-1.1">libqt5-qtwebengine-private-headers-devel-5.15.19-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libQt5Pdf5-5.15.19-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libQt5Pdf5-5.15.19-1.1">libQt5Pdf5-5.15.19-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libQt5PdfWidgets5-5.15.19-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.19-1.1">libQt5PdfWidgets5-5.15.19-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt5-qtpdf-devel-5.15.19-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.19-1.1">libqt5-qtpdf-devel-5.15.19-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt5-qtpdf-examples-5.15.19-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.19-1.1">libqt5-qtpdf-examples-5.15.19-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt5-qtpdf-imports-5.15.19-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.19-1.1">libqt5-qtpdf-imports-5.15.19-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt5-qtpdf-private-headers-devel-5.15.19-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.19-1.1">libqt5-qtpdf-private-headers-devel-5.15.19-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt5-qtwebengine-5.15.19-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt5-qtwebengine-5.15.19-1.1">libqt5-qtwebengine-5.15.19-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt5-qtwebengine-devel-5.15.19-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.19-1.1">libqt5-qtwebengine-devel-5.15.19-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt5-qtwebengine-examples-5.15.19-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.19-1.1">libqt5-qtwebengine-examples-5.15.19-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libqt5-qtwebengine-private-headers-devel-5.15.19-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.19-1.1">libqt5-qtwebengine-private-headers-devel-5.15.19-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Inappropriate implementation in Extensions in Google Chrome prior to 130.0.6723.69 allowed a remote attacker to bypass site isolation via a crafted Chrome Extension. (Chromium security severity: High)</Note>
    </Notes>
    <CVE>CVE-2024-10229</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.19-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-10229.html</URL>
        <Description>CVE-2024-10229</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232060</URL>
        <Description>SUSE Bug 1232060</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use after free in Serial in Google Chrome prior to 130.0.6723.116 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)</Note>
    </Notes>
    <CVE>CVE-2024-10827</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.19-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-10827.html</URL>
        <Description>CVE-2024-10827</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1232843</URL>
        <Description>SUSE Bug 1232843</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">7-Zip Zstandard Decompression Integer Underflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of 7-Zip. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the implementation of Zstandard decompression. The issue results from the lack of proper validation of user-supplied data, which can result in an integer underflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24346.</Note>
    </Notes>
    <CVE>CVE-2024-11477</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.19-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-11477.html</URL>
        <Description>CVE-2024-11477</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1233581</URL>
        <Description>SUSE Bug 1233581</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use after free in Compositing in Google Chrome prior to 131.0.6778.204 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)</Note>
    </Notes>
    <CVE>CVE-2024-12694</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.19-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-12694.html</URL>
        <Description>CVE-2024-12694</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234704</URL>
        <Description>SUSE Bug 1234704</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">xsltGetInheritedNsList in libxslt before 1.1.43 has a use-after-free issue related to exclusion of result prefixes.</Note>
    </Notes>
    <CVE>CVE-2024-55549</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.19-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-55549.html</URL>
        <Description>CVE-2024-55549</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1239637</URL>
        <Description>SUSE Bug 1239637</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in Skia in Google Chrome prior to 132.0.6834.83 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)</Note>
    </Notes>
    <CVE>CVE-2025-0436</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.19-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-0436.html</URL>
        <Description>CVE-2025-0436</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1235892</URL>
        <Description>SUSE Bug 1235892</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use after free in DevTools in Google Chrome prior to 132.0.6834.159 allowed a remote attacker to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: Medium)</Note>
    </Notes>
    <CVE>CVE-2025-0762</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.19-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-0762.html</URL>
        <Description>CVE-2025-0762</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1236586</URL>
        <Description>SUSE Bug 1236586</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Inappropriate implementation in Browser UI in Google Chrome on Android prior to 133.0.6943.98 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)</Note>
    </Notes>
    <CVE>CVE-2025-0996</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.19-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-0996.html</URL>
        <Description>CVE-2025-0996</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1237121</URL>
        <Description>SUSE Bug 1237121</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap buffer overflow in V8 in Google Chrome prior to 133.0.6943.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)</Note>
    </Notes>
    <CVE>CVE-2025-0999</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.19-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-0999.html</URL>
        <Description>CVE-2025-0999</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1237343</URL>
        <Description>SUSE Bug 1237343</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap buffer overflow in GPU in Google Chrome on Android prior to 133.0.6943.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)</Note>
    </Notes>
    <CVE>CVE-2025-1426</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.19-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-1426.html</URL>
        <Description>CVE-2025-1426</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1237343</URL>
        <Description>SUSE Bug 1237343</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Out of bounds read in Media in Google Chrome prior to 134.0.6998.35 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)</Note>
    </Notes>
    <CVE>CVE-2025-1919</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.19-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-1919.html</URL>
        <Description>CVE-2025-1919</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1238575</URL>
        <Description>SUSE Bug 1238575</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use after free in Inspector in Google Chrome prior to 134.0.6998.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)</Note>
    </Notes>
    <CVE>CVE-2025-2136</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.19-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-2136.html</URL>
        <Description>CVE-2025-2136</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1239216</URL>
        <Description>SUSE Bug 1239216</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out-of-bounds write issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in visionOS 2.3.2, iOS 18.3.2 and iPadOS 18.3.2, macOS Sequoia 15.3.2, Safari 18.3.1, watchOS 11.4, iPadOS 17.7.6, iOS 16.7.11 and iPadOS 16.7.11, iOS 15.8.4 and iPadOS 15.8.4. Maliciously crafted web content may be able to break out of Web Content sandbox. This is a supplementary fix for an attack that was blocked in iOS 17.2. (Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 17.2.).</Note>
    </Notes>
    <CVE>CVE-2025-24201</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.19-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-24201.html</URL>
        <Description>CVE-2025-24201</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1239547</URL>
        <Description>SUSE Bug 1239547</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">numbers.c in libxslt before 1.1.43 has a use-after-free because, in nested XPath evaluations, an XPath context node can be modified but never restored. This is related to xsltNumberFormatGetValue, xsltEvalXPathPredicate, xsltEvalXPathStringNs, and xsltComputeSortResultInternal.</Note>
    </Notes>
    <CVE>CVE-2025-24855</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.19-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-24855.html</URL>
        <Description>CVE-2025-24855</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1239625</URL>
        <Description>SUSE Bug 1239625</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 134.0.6998.177 allowed a remote attacker to perform a sandbox escape via a malicious file. (Chromium security severity: High)</Note>
    </Notes>
    <CVE>CVE-2025-2783</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.19-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-2783.html</URL>
        <Description>CVE-2025-2783</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1240084</URL>
        <Description>SUSE Bug 1240084</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap buffer overflow in Codecs in Google Chrome on Windows prior to 135.0.7049.95 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)</Note>
    </Notes>
    <CVE>CVE-2025-3619</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libQt5Pdf5-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libQt5PdfWidgets5-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-examples-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-imports-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtpdf-private-headers-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-devel-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-examples-5.15.19-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libqt5-qtwebengine-private-headers-devel-5.15.19-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-3619.html</URL>
        <Description>CVE-2025-3619</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1241288</URL>
        <Description>SUSE Bug 1241288</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
