<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for webkit2gtk3</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:1033-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-03-26T15:44:32Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-03-26T15:44:32Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-03-26T15:44:32Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for webkit2gtk3</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for webkit2gtk3 fixes the following issues:

  - CVE-2024-44192: Fixed unexpected process crash due to processing maliciously crafted web content (bsc#1239863)
  - CVE-2024-54467: Fixed data exilfration cross-origin due to a cookie management issue via a malicious website (bsc#1239864) 

Other fixes:
- Update to version 2.48.0 
  + Move tiles rendering to worker threads when rendering with the
    GPU.
  + Fix preserve-3D intersection rendering.
  + Added new function for creating Promise objects to
    JavaScripotCore GLib API.
  + The MediaRecorder backend gained WebM support (requires at
    least GStreamer 1.24.9) and audio bitrate configuration
    support.
  + Fix invalid DPI-aware font size conversion.
  + Bring back support for OpenType-SVG fonts using Skia SVG
    module.
  + Add metadata (title and creation/modification date) to the PDF
    document generated for printing.
  + Propagate the font’s computed locale to HarfBuzz.
  + The GPU process build is now enabled for WebGL, but the web
    process is still used by default. The runtime flag
    UseGPUProcessForWebGL can be used to use the GPU process for
    WebGL.
- Add gcc13-PIE to BuildRequires (bsc#1239950).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2025-1033</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20251033-1/</URL>
      <Description>Link for SUSE-SU-2025:1033-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KJC3GUPN6T3FGCOPMOLUI52AMJZNNKNX/</URL>
      <Description>E-Mail link for SUSE-SU-2025:1033-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1239863</URL>
      <Description>SUSE Bug 1239863</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1239864</URL>
      <Description>SUSE Bug 1239864</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1239950</URL>
      <Description>SUSE Bug 1239950</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-44192/</URL>
      <Description>SUSE CVE CVE-2024-44192 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-54467/</URL>
      <Description>SUSE CVE CVE-2024-54467 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-24201/</URL>
      <Description>SUSE CVE CVE-2025-24201 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Version" Name="WebKitGTK-4.0-lang-2.48.0-150400.4.112.1">
      <FullProductName ProductID="WebKitGTK-4.0-lang-2.48.0-150400.4.112.1">WebKitGTK-4.0-lang-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="WebKitGTK-4.1-lang-2.48.0-150400.4.112.1">
      <FullProductName ProductID="WebKitGTK-4.1-lang-2.48.0-150400.4.112.1">WebKitGTK-4.1-lang-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="WebKitGTK-6.0-lang-2.48.0-150400.4.112.1">
      <FullProductName ProductID="WebKitGTK-6.0-lang-2.48.0-150400.4.112.1">WebKitGTK-6.0-lang-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-4_0-18-2.48.0-150400.4.112.1">
      <FullProductName ProductID="libjavascriptcoregtk-4_0-18-2.48.0-150400.4.112.1">libjavascriptcoregtk-4_0-18-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-4_0-18-32bit-2.48.0-150400.4.112.1">
      <FullProductName ProductID="libjavascriptcoregtk-4_0-18-32bit-2.48.0-150400.4.112.1">libjavascriptcoregtk-4_0-18-32bit-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-4_0-18-64bit-2.48.0-150400.4.112.1">
      <FullProductName ProductID="libjavascriptcoregtk-4_0-18-64bit-2.48.0-150400.4.112.1">libjavascriptcoregtk-4_0-18-64bit-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-4_1-0-2.48.0-150400.4.112.1">
      <FullProductName ProductID="libjavascriptcoregtk-4_1-0-2.48.0-150400.4.112.1">libjavascriptcoregtk-4_1-0-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-4_1-0-32bit-2.48.0-150400.4.112.1">
      <FullProductName ProductID="libjavascriptcoregtk-4_1-0-32bit-2.48.0-150400.4.112.1">libjavascriptcoregtk-4_1-0-32bit-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-4_1-0-64bit-2.48.0-150400.4.112.1">
      <FullProductName ProductID="libjavascriptcoregtk-4_1-0-64bit-2.48.0-150400.4.112.1">libjavascriptcoregtk-4_1-0-64bit-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-6_0-1-2.48.0-150400.4.112.1">
      <FullProductName ProductID="libjavascriptcoregtk-6_0-1-2.48.0-150400.4.112.1">libjavascriptcoregtk-6_0-1-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk-4_0-37-2.48.0-150400.4.112.1">
      <FullProductName ProductID="libwebkit2gtk-4_0-37-2.48.0-150400.4.112.1">libwebkit2gtk-4_0-37-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk-4_0-37-32bit-2.48.0-150400.4.112.1">
      <FullProductName ProductID="libwebkit2gtk-4_0-37-32bit-2.48.0-150400.4.112.1">libwebkit2gtk-4_0-37-32bit-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk-4_0-37-64bit-2.48.0-150400.4.112.1">
      <FullProductName ProductID="libwebkit2gtk-4_0-37-64bit-2.48.0-150400.4.112.1">libwebkit2gtk-4_0-37-64bit-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk-4_1-0-2.48.0-150400.4.112.1">
      <FullProductName ProductID="libwebkit2gtk-4_1-0-2.48.0-150400.4.112.1">libwebkit2gtk-4_1-0-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk-4_1-0-32bit-2.48.0-150400.4.112.1">
      <FullProductName ProductID="libwebkit2gtk-4_1-0-32bit-2.48.0-150400.4.112.1">libwebkit2gtk-4_1-0-32bit-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk-4_1-0-64bit-2.48.0-150400.4.112.1">
      <FullProductName ProductID="libwebkit2gtk-4_1-0-64bit-2.48.0-150400.4.112.1">libwebkit2gtk-4_1-0-64bit-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkitgtk-6_0-4-2.48.0-150400.4.112.1">
      <FullProductName ProductID="libwebkitgtk-6_0-4-2.48.0-150400.4.112.1">libwebkitgtk-6_0-4-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-JavaScriptCore-4_0-2.48.0-150400.4.112.1">
      <FullProductName ProductID="typelib-1_0-JavaScriptCore-4_0-2.48.0-150400.4.112.1">typelib-1_0-JavaScriptCore-4_0-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-JavaScriptCore-4_1-2.48.0-150400.4.112.1">
      <FullProductName ProductID="typelib-1_0-JavaScriptCore-4_1-2.48.0-150400.4.112.1">typelib-1_0-JavaScriptCore-4_1-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-JavaScriptCore-6_0-2.48.0-150400.4.112.1">
      <FullProductName ProductID="typelib-1_0-JavaScriptCore-6_0-2.48.0-150400.4.112.1">typelib-1_0-JavaScriptCore-6_0-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit-6_0-2.48.0-150400.4.112.1">
      <FullProductName ProductID="typelib-1_0-WebKit-6_0-2.48.0-150400.4.112.1">typelib-1_0-WebKit-6_0-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit2-4_0-2.48.0-150400.4.112.1">
      <FullProductName ProductID="typelib-1_0-WebKit2-4_0-2.48.0-150400.4.112.1">typelib-1_0-WebKit2-4_0-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit2-4_1-2.48.0-150400.4.112.1">
      <FullProductName ProductID="typelib-1_0-WebKit2-4_1-2.48.0-150400.4.112.1">typelib-1_0-WebKit2-4_1-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit2WebExtension-4_0-2.48.0-150400.4.112.1">
      <FullProductName ProductID="typelib-1_0-WebKit2WebExtension-4_0-2.48.0-150400.4.112.1">typelib-1_0-WebKit2WebExtension-4_0-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit2WebExtension-4_1-2.48.0-150400.4.112.1">
      <FullProductName ProductID="typelib-1_0-WebKit2WebExtension-4_1-2.48.0-150400.4.112.1">typelib-1_0-WebKit2WebExtension-4_1-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKitWebProcessExtension-6_0-2.48.0-150400.4.112.1">
      <FullProductName ProductID="typelib-1_0-WebKitWebProcessExtension-6_0-2.48.0-150400.4.112.1">typelib-1_0-WebKitWebProcessExtension-6_0-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit-jsc-4-2.48.0-150400.4.112.1">
      <FullProductName ProductID="webkit-jsc-4-2.48.0-150400.4.112.1">webkit-jsc-4-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit-jsc-4.1-2.48.0-150400.4.112.1">
      <FullProductName ProductID="webkit-jsc-4.1-2.48.0-150400.4.112.1">webkit-jsc-4.1-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit-jsc-6.0-2.48.0-150400.4.112.1">
      <FullProductName ProductID="webkit-jsc-6.0-2.48.0-150400.4.112.1">webkit-jsc-6.0-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk-4_0-injected-bundles-2.48.0-150400.4.112.1">
      <FullProductName ProductID="webkit2gtk-4_0-injected-bundles-2.48.0-150400.4.112.1">webkit2gtk-4_0-injected-bundles-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk-4_1-injected-bundles-2.48.0-150400.4.112.1">
      <FullProductName ProductID="webkit2gtk-4_1-injected-bundles-2.48.0-150400.4.112.1">webkit2gtk-4_1-injected-bundles-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk3-devel-2.48.0-150400.4.112.1">
      <FullProductName ProductID="webkit2gtk3-devel-2.48.0-150400.4.112.1">webkit2gtk3-devel-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk3-minibrowser-2.48.0-150400.4.112.1">
      <FullProductName ProductID="webkit2gtk3-minibrowser-2.48.0-150400.4.112.1">webkit2gtk3-minibrowser-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk3-soup2-devel-2.48.0-150400.4.112.1">
      <FullProductName ProductID="webkit2gtk3-soup2-devel-2.48.0-150400.4.112.1">webkit2gtk3-soup2-devel-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk3-soup2-minibrowser-2.48.0-150400.4.112.1">
      <FullProductName ProductID="webkit2gtk3-soup2-minibrowser-2.48.0-150400.4.112.1">webkit2gtk3-soup2-minibrowser-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk4-devel-2.48.0-150400.4.112.1">
      <FullProductName ProductID="webkit2gtk4-devel-2.48.0-150400.4.112.1">webkit2gtk4-devel-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk4-minibrowser-2.48.0-150400.4.112.1">
      <FullProductName ProductID="webkit2gtk4-minibrowser-2.48.0-150400.4.112.1">webkit2gtk4-minibrowser-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkitgtk-6_0-injected-bundles-2.48.0-150400.4.112.1">
      <FullProductName ProductID="webkitgtk-6_0-injected-bundles-2.48.0-150400.4.112.1">webkitgtk-6_0-injected-bundles-2.48.0-150400.4.112.1</FullProductName>
    </Branch>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The issue was addressed with improved checks. This issue is fixed in watchOS 11, macOS Sequoia 15, Safari 18, visionOS 2, iOS 18 and iPadOS 18, tvOS 18. Processing maliciously crafted web content may lead to an unexpected process crash.</Note>
    </Notes>
    <CVE>CVE-2024-44192</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20251033-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-44192.html</URL>
        <Description>CVE-2024-44192</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1239863</URL>
        <Description>SUSE Bug 1239863</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A cookie management issue was addressed with improved state management. This issue is fixed in watchOS 11, macOS Sequoia 15, Safari 18, visionOS 2, iOS 18 and iPadOS 18, tvOS 18. A malicious website may exfiltrate data cross-origin.</Note>
    </Notes>
    <CVE>CVE-2024-54467</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20251033-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-54467.html</URL>
        <Description>CVE-2024-54467</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1239864</URL>
        <Description>SUSE Bug 1239864</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out-of-bounds write issue was addressed with improved checks to prevent unauthorized actions. This issue is fixed in visionOS 2.3.2, iOS 18.3.2 and iPadOS 18.3.2, macOS Sequoia 15.3.2, Safari 18.3.1. Maliciously crafted web content may be able to break out of Web Content sandbox. This is a supplementary fix for an attack that was blocked in iOS 17.2. (Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 17.2.).</Note>
    </Notes>
    <CVE>CVE-2025-24201</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20251033-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-24201.html</URL>
        <Description>CVE-2025-24201</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1239547</URL>
        <Description>SUSE Bug 1239547</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
