<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for webkit2gtk3</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:4528-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-12-26T14:52:35Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-12-26T14:52:35Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-12-26T14:52:35Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for webkit2gtk3</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for webkit2gtk3 fixes the following issues:

Update to version 2.50.4.

Security issues fixed:

- CVE-2025-14174: processing maliciously crafted web content may lead to memory corruption due to improper validation
  (bsc#1255497).
- CVE-2025-43501: processing maliciously crafted web content may lead to an unexpected process crash due to a buffer
  overflow issue (bsc#1255194).
- CVE-2025-43529: processing maliciously crafted web content may lead to arbitrary code execution due to a
  use-after-free issue (bsc#1255198).
- CVE-2025-43531: processing maliciously crafted web content may lead to an unexpected process crash due to a race
  condition (bsc#1255183).
- CVE-2025-43535: processing maliciously crafted web content may lead to an unexpected process crash due to improper
  memory handling (bsc#1255195).
- CVE-2025-43536: processing maliciously crafted web content may lead to an unexpected process crash due to a
  use-after-free issue (bsc#1255200).
- CVE-2025-43541: processing maliciously crafted web content may lead to an unexpected process crash due to type
  confusion (bsc#1255191).

Other updates and bugfixes:

- Correctly handle the program name passed to the sleep disabler.
- Ensure GStreamer is initialized before using the Quirks.
- Fix several crashes and rendering issues.
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2025-4528,SUSE-SLE-SERVER-12-SP5-LTSS-2025-4528,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-4528</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20254528-1/</URL>
      <Description>Link for SUSE-SU-2025:4528-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2025-December/023654.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:4528-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1255183</URL>
      <Description>SUSE Bug 1255183</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1255191</URL>
      <Description>SUSE Bug 1255191</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1255194</URL>
      <Description>SUSE Bug 1255194</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1255195</URL>
      <Description>SUSE Bug 1255195</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1255198</URL>
      <Description>SUSE Bug 1255198</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1255200</URL>
      <Description>SUSE Bug 1255200</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1255497</URL>
      <Description>SUSE Bug 1255497</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-14174/</URL>
      <Description>SUSE CVE CVE-2025-14174 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-43501/</URL>
      <Description>SUSE CVE CVE-2025-43501 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-43529/</URL>
      <Description>SUSE CVE CVE-2025-43529 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-43531/</URL>
      <Description>SUSE CVE CVE-2025-43531 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-43535/</URL>
      <Description>SUSE CVE CVE-2025-43535 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-43536/</URL>
      <Description>SUSE CVE CVE-2025-43536 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-43541/</URL>
      <Description>SUSE CVE CVE-2025-43541 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP5-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS" CPE="cpe:/o:suse:sles-ltss:12:sp5">SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" CPE="cpe:/o:suse:sles-ltss-extended-security:12:sp5">SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-4_0-18-2.50.4-4.51.1">
      <FullProductName ProductID="libjavascriptcoregtk-4_0-18-2.50.4-4.51.1">libjavascriptcoregtk-4_0-18-2.50.4-4.51.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-4_0-18-32bit-2.50.4-4.51.1">
      <FullProductName ProductID="libjavascriptcoregtk-4_0-18-32bit-2.50.4-4.51.1">libjavascriptcoregtk-4_0-18-32bit-2.50.4-4.51.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libjavascriptcoregtk-4_0-18-64bit-2.50.4-4.51.1">
      <FullProductName ProductID="libjavascriptcoregtk-4_0-18-64bit-2.50.4-4.51.1">libjavascriptcoregtk-4_0-18-64bit-2.50.4-4.51.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk-4_0-37-2.50.4-4.51.1">
      <FullProductName ProductID="libwebkit2gtk-4_0-37-2.50.4-4.51.1">libwebkit2gtk-4_0-37-2.50.4-4.51.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk-4_0-37-32bit-2.50.4-4.51.1">
      <FullProductName ProductID="libwebkit2gtk-4_0-37-32bit-2.50.4-4.51.1">libwebkit2gtk-4_0-37-32bit-2.50.4-4.51.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk-4_0-37-64bit-2.50.4-4.51.1">
      <FullProductName ProductID="libwebkit2gtk-4_0-37-64bit-2.50.4-4.51.1">libwebkit2gtk-4_0-37-64bit-2.50.4-4.51.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libwebkit2gtk3-lang-2.50.4-4.51.1">
      <FullProductName ProductID="libwebkit2gtk3-lang-2.50.4-4.51.1">libwebkit2gtk3-lang-2.50.4-4.51.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-JavaScriptCore-4_0-2.50.4-4.51.1">
      <FullProductName ProductID="typelib-1_0-JavaScriptCore-4_0-2.50.4-4.51.1">typelib-1_0-JavaScriptCore-4_0-2.50.4-4.51.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit2-4_0-2.50.4-4.51.1">
      <FullProductName ProductID="typelib-1_0-WebKit2-4_0-2.50.4-4.51.1">typelib-1_0-WebKit2-4_0-2.50.4-4.51.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="typelib-1_0-WebKit2WebExtension-4_0-2.50.4-4.51.1">
      <FullProductName ProductID="typelib-1_0-WebKit2WebExtension-4_0-2.50.4-4.51.1">typelib-1_0-WebKit2WebExtension-4_0-2.50.4-4.51.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit-jsc-4-2.50.4-4.51.1">
      <FullProductName ProductID="webkit-jsc-4-2.50.4-4.51.1">webkit-jsc-4-2.50.4-4.51.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk-4_0-injected-bundles-2.50.4-4.51.1">
      <FullProductName ProductID="webkit2gtk-4_0-injected-bundles-2.50.4-4.51.1">webkit2gtk-4_0-injected-bundles-2.50.4-4.51.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk3-devel-2.50.4-4.51.1">
      <FullProductName ProductID="webkit2gtk3-devel-2.50.4-4.51.1">webkit2gtk3-devel-2.50.4-4.51.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="webkit2gtk3-minibrowser-2.50.4-4.51.1">
      <FullProductName ProductID="webkit2gtk3-minibrowser-2.50.4-4.51.1">webkit2gtk3-minibrowser-2.50.4-4.51.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libjavascriptcoregtk-4_0-18-2.50.4-4.51.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.50.4-4.51.1">libjavascriptcoregtk-4_0-18-2.50.4-4.51.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk-4_0-37-2.50.4-4.51.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.50.4-4.51.1">libwebkit2gtk-4_0-37-2.50.4-4.51.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk3-lang-2.50.4-4.51.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk3-lang-2.50.4-4.51.1">libwebkit2gtk3-lang-2.50.4-4.51.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-JavaScriptCore-4_0-2.50.4-4.51.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.50.4-4.51.1">typelib-1_0-JavaScriptCore-4_0-2.50.4-4.51.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-WebKit2-4_0-2.50.4-4.51.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.50.4-4.51.1">typelib-1_0-WebKit2-4_0-2.50.4-4.51.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-WebKit2WebExtension-4_0-2.50.4-4.51.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.50.4-4.51.1">typelib-1_0-WebKit2WebExtension-4_0-2.50.4-4.51.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk-4_0-injected-bundles-2.50.4-4.51.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.50.4-4.51.1">webkit2gtk-4_0-injected-bundles-2.50.4-4.51.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk3-devel-2.50.4-4.51.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.50.4-4.51.1">webkit2gtk3-devel-2.50.4-4.51.1 as a component of SUSE Linux Enterprise Server 12 SP5-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="libjavascriptcoregtk-4_0-18-2.50.4-4.51.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libjavascriptcoregtk-4_0-18-2.50.4-4.51.1">libjavascriptcoregtk-4_0-18-2.50.4-4.51.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk-4_0-37-2.50.4-4.51.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk-4_0-37-2.50.4-4.51.1">libwebkit2gtk-4_0-37-2.50.4-4.51.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="libwebkit2gtk3-lang-2.50.4-4.51.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk3-lang-2.50.4-4.51.1">libwebkit2gtk3-lang-2.50.4-4.51.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-JavaScriptCore-4_0-2.50.4-4.51.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.50.4-4.51.1">typelib-1_0-JavaScriptCore-4_0-2.50.4-4.51.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-WebKit2-4_0-2.50.4-4.51.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2-4_0-2.50.4-4.51.1">typelib-1_0-WebKit2-4_0-2.50.4-4.51.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="typelib-1_0-WebKit2WebExtension-4_0-2.50.4-4.51.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.50.4-4.51.1">typelib-1_0-WebKit2WebExtension-4_0-2.50.4-4.51.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk-4_0-injected-bundles-2.50.4-4.51.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk-4_0-injected-bundles-2.50.4-4.51.1">webkit2gtk-4_0-injected-bundles-2.50.4-4.51.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="webkit2gtk3-devel-2.50.4-4.51.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk3-devel-2.50.4-4.51.1">webkit2gtk3-devel-2.50.4-4.51.1 as a component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 143.0.7499.110 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)</Note>
    </Notes>
    <CVE>CVE-2025-14174</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk3-lang-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libjavascriptcoregtk-4_0-18-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk-4_0-37-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk3-lang-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk-4_0-injected-bundles-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk3-devel-2.50.4-4.51.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20254528-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-14174.html</URL>
        <Description>CVE-2025-14174</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1254776</URL>
        <Description>SUSE Bug 1254776</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A buffer overflow issue was addressed with improved memory handling. This issue is fixed in Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, visionOS 26.2. Processing maliciously crafted web content may lead to an unexpected process crash.</Note>
    </Notes>
    <CVE>CVE-2025-43501</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk3-lang-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libjavascriptcoregtk-4_0-18-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk-4_0-37-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk3-lang-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk-4_0-injected-bundles-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk3-devel-2.50.4-4.51.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20254528-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-43501.html</URL>
        <Description>CVE-2025-43501</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1255194</URL>
        <Description>SUSE Bug 1255194</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 26.2, Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, visionOS 26.2, tvOS 26.2. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 was also issued in response to this report.</Note>
    </Notes>
    <CVE>CVE-2025-43529</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk3-lang-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libjavascriptcoregtk-4_0-18-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk-4_0-37-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk3-lang-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk-4_0-injected-bundles-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk3-devel-2.50.4-4.51.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20254528-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-43529.html</URL>
        <Description>CVE-2025-43529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1255198</URL>
        <Description>SUSE Bug 1255198</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A race condition was addressed with improved state handling. This issue is fixed in watchOS 26.2, Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, visionOS 26.2, tvOS 26.2. Processing maliciously crafted web content may lead to an unexpected process crash.</Note>
    </Notes>
    <CVE>CVE-2025-43531</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk3-lang-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libjavascriptcoregtk-4_0-18-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk-4_0-37-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk3-lang-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk-4_0-injected-bundles-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk3-devel-2.50.4-4.51.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20254528-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-43531.html</URL>
        <Description>CVE-2025-43531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1255183</URL>
        <Description>SUSE Bug 1255183</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The issue was addressed with improved memory handling. This issue is fixed in Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, visionOS 26.2. Processing maliciously crafted web content may lead to an unexpected process crash.</Note>
    </Notes>
    <CVE>CVE-2025-43535</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk3-lang-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libjavascriptcoregtk-4_0-18-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk-4_0-37-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk3-lang-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk-4_0-injected-bundles-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk3-devel-2.50.4-4.51.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20254528-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-43535.html</URL>
        <Description>CVE-2025-43535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1255195</URL>
        <Description>SUSE Bug 1255195</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Tahoe 26.2, iOS 26.2 and iPadOS 26.2, Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3. Processing maliciously crafted web content may lead to an unexpected process crash.</Note>
    </Notes>
    <CVE>CVE-2025-43536</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk3-lang-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libjavascriptcoregtk-4_0-18-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk-4_0-37-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk3-lang-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk-4_0-injected-bundles-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk3-devel-2.50.4-4.51.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20254528-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-43536.html</URL>
        <Description>CVE-2025-43536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1255200</URL>
        <Description>SUSE Bug 1255200</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A type confusion issue was addressed with improved state handling. This issue is fixed in Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, visionOS 26.2. Processing maliciously crafted web content may lead to an unexpected Safari crash.</Note>
    </Notes>
    <CVE>CVE-2025-43541</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libjavascriptcoregtk-4_0-18-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk-4_0-37-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:libwebkit2gtk3-lang-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-JavaScriptCore-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:typelib-1_0-WebKit2WebExtension-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk-4_0-injected-bundles-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5-LTSS:webkit2gtk3-devel-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libjavascriptcoregtk-4_0-18-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk-4_0-37-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libwebkit2gtk3-lang-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-JavaScriptCore-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:typelib-1_0-WebKit2WebExtension-4_0-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk-4_0-injected-bundles-2.50.4-4.51.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:webkit2gtk3-devel-2.50.4-4.51.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20254528-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-43541.html</URL>
        <Description>CVE-2025-43541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1255191</URL>
        <Description>SUSE Bug 1255191</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
