SUSE 5299 Published by

SUSE Linux has been updated with multiple security enhancements, which include python311-aiohttp, rubygem-bundler, hauler, python-lxml-doc, gitoxide, oci-cli, GraphicsMagick, govulncheck-vulndb, perl-Data-Entropy, pgadmin4, and webkit2gtk3:

openSUSE-SU-2025:14998-1: moderate: python311-aiohttp-3.11.16-1.1 on GA media
SUSE-SU-2025:1294-1: important: Security update for rubygem-bundler
openSUSE-SU-2025:14996-1: moderate: hauler-1.2.2-1.1 on GA media
openSUSE-SU-2025:14999-1: moderate: python-lxml-doc-5.3.2-1.1 on GA media
openSUSE-SU-2025:14994-1: moderate: gitoxide-0.42.0-1.1 on GA media
openSUSE-SU-2025:14997-1: moderate: oci-cli-3.54.1-1.1 on GA media
openSUSE-SU-2025:14993-1: moderate: GraphicsMagick-1.3.45-3.1 on GA media
openSUSE-SU-2025:14995-1: moderate: govulncheck-vulndb-0.0.20250410T162706-1.1 on GA media
openSUSE-SU-2025:0123-1: moderate: Security update for perl-Data-Entropy
SUSE-SU-2025:1326-1: important: Security update for pgadmin4
SUSE-SU-2025:1331-1: important: Security update for webkit2gtk3




openSUSE-SU-2025:14998-1: moderate: python311-aiohttp-3.11.16-1.1 on GA media


# python311-aiohttp-3.11.16-1.1 on GA media

Announcement ID: openSUSE-SU-2025:14998-1
Rating: moderate

Cross-References:

* CVE-2024-12254

CVSS scores:

* CVE-2024-12254 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-12254 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the python311-aiohttp-3.11.16-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* python311-aiohttp 3.11.16-1.1
* python312-aiohttp 3.11.16-1.1
* python313-aiohttp 3.11.16-1.1

## References:

* https://www.suse.com/security/cve/CVE-2024-12254.html



SUSE-SU-2025:1294-1: important: Security update for rubygem-bundler


# Security update for rubygem-bundler

Announcement ID: SUSE-SU-2025:1294-1
Release Date: 2025-04-16T07:53:41Z
Rating: important
References:

* bsc#1185842

Cross-References:

* CVE-2020-36327

CVSS scores:

* CVE-2020-36327 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2020-36327 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Affected Products:

* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves one vulnerability can now be installed.

## Description:

This update for rubygem-bundler fixes the following issues:

* CVE-2020-36327: Fixed bundler choosing a dependency source based on the
highest gem version number, which means that a rogue gem found at a public
source may be chosen (bsc#1185842)

Other fixes:
\- Updated to version 2.2.34

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-1294=1

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1294=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1294=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1294=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1294=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1294=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1294=1

* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1294=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1294=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1294=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1294=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1294=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1294=1

* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1294=1

* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2025-1294=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1294=1

* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2025-1294=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* ruby2.5-rubygem-bundler-doc-2.2.34-150000.3.11.1
* ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64)
* ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1
* SUSE Manager Proxy 4.3 (x86_64)
* ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1

## References:

* https://www.suse.com/security/cve/CVE-2020-36327.html
* https://bugzilla.suse.com/show_bug.cgi?id=1185842



openSUSE-SU-2025:14996-1: moderate: hauler-1.2.2-1.1 on GA media


# hauler-1.2.2-1.1 on GA media

Announcement ID: openSUSE-SU-2025:14996-1
Rating: moderate

Cross-References:

* CVE-2024-0406

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the hauler-1.2.2-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* hauler 1.2.2-1.1

## References:

* https://www.suse.com/security/cve/CVE-2024-0406.html



openSUSE-SU-2025:14999-1: moderate: python-lxml-doc-5.3.2-1.1 on GA media


# python-lxml-doc-5.3.2-1.1 on GA media

Announcement ID: openSUSE-SU-2025:14999-1
Rating: moderate

Cross-References:

* CVE-2025-24928

CVSS scores:

* CVE-2025-24928 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L
* CVE-2025-24928 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the python-lxml-doc-5.3.2-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* python-lxml-doc 5.3.2-1.1
* python311-lxml 5.3.2-1.1
* python311-lxml-devel 5.3.2-1.1
* python312-lxml 5.3.2-1.1
* python312-lxml-devel 5.3.2-1.1
* python313-lxml 5.3.2-1.1
* python313-lxml-devel 5.3.2-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-24928.html



openSUSE-SU-2025:14994-1: moderate: gitoxide-0.42.0-1.1 on GA media


# gitoxide-0.42.0-1.1 on GA media

Announcement ID: openSUSE-SU-2025:14994-1
Rating: moderate

Cross-References:

* CVE-2025-22620
* CVE-2025-31130

Affected Products:

* openSUSE Tumbleweed

An update that solves 2 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the gitoxide-0.42.0-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* gitoxide 0.42.0-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-22620.html
* https://www.suse.com/security/cve/CVE-2025-31130.html



openSUSE-SU-2025:14997-1: moderate: oci-cli-3.54.1-1.1 on GA media


# oci-cli-3.54.1-1.1 on GA media

Announcement ID: openSUSE-SU-2025:14997-1
Rating: moderate

Cross-References:

* CVE-2023-32681
* CVE-2024-39689
* CVE-2024-56201
* CVE-2024-56326

CVSS scores:

* CVE-2023-32681 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
* CVE-2024-39689 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-56201 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56326 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Tumbleweed

An update that solves 4 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the oci-cli-3.54.1-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* oci-cli 3.54.1-1.1

## References:

* https://www.suse.com/security/cve/CVE-2023-32681.html
* https://www.suse.com/security/cve/CVE-2024-39689.html
* https://www.suse.com/security/cve/CVE-2024-56201.html
* https://www.suse.com/security/cve/CVE-2024-56326.html



openSUSE-SU-2025:14993-1: moderate: GraphicsMagick-1.3.45-3.1 on GA media


# GraphicsMagick-1.3.45-3.1 on GA media

Announcement ID: openSUSE-SU-2025:14993-1
Rating: moderate

Cross-References:

* CVE-2025-32460

CVSS scores:

* CVE-2025-32460 ( SUSE ): 4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2025-32460 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the GraphicsMagick-1.3.45-3.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* GraphicsMagick 1.3.45-3.1
* GraphicsMagick-devel 1.3.45-3.1
* libGraphicsMagick++-Q16-12 1.3.45-3.1
* libGraphicsMagick++-devel 1.3.45-3.1
* libGraphicsMagick-Q16-3 1.3.45-3.1
* libGraphicsMagick3-config 1.3.45-3.1
* libGraphicsMagickWand-Q16-2 1.3.45-3.1
* perl-GraphicsMagick 1.3.45-3.1

## References:

* https://www.suse.com/security/cve/CVE-2025-32460.html



openSUSE-SU-2025:14995-1: moderate: govulncheck-vulndb-0.0.20250410T162706-1.1 on GA media


# govulncheck-vulndb-0.0.20250410T162706-1.1 on GA media

Announcement ID: openSUSE-SU-2025:14995-1
Rating: moderate

Cross-References:

* CVE-2025-32386
* CVE-2025-32387

CVSS scores:

* CVE-2025-32386 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-32386 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-32387 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-32387 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 2 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the govulncheck-vulndb-0.0.20250410T162706-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* govulncheck-vulndb 0.0.20250410T162706-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-32386.html
* https://www.suse.com/security/cve/CVE-2025-32387.html



openSUSE-SU-2025:0123-1: moderate: Security update for perl-Data-Entropy


openSUSE Security Update: Security update for perl-Data-Entropy
_______________________________

Announcement ID: openSUSE-SU-2025:0123-1
Rating: moderate
References: #1240395
Cross-References: CVE-2025-1860
Affected Products:
openSUSE Backports SLE-15-SP6
_______________________________

An update that fixes one vulnerability is now available.

Description:

This update for perl-Data-Entropy fixes the following issues:

Updated to 0.8.0 (0.008):

see /usr/share/doc/packages/perl-Data-Entropy/Changes

Version 0.008; 2025-03-27:

* Use Crypt::URandom to seed the default algorithm with
cryptographically secure random bytes instead of the builtin rand()
function (boo#1240395, CVE-2025-1860).
* This module has been marked as deprecated.
* A security policy was added.
* Remove use of Module::Build.
* Updated maintainer information.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP6:

zypper in -t patch openSUSE-2025-123=1

Package List:

- openSUSE Backports SLE-15-SP6 (noarch):

perl-Data-Entropy-0.8.0-bp156.4.3.1

References:

https://www.suse.com/security/cve/CVE-2025-1860.html
https://bugzilla.suse.com/1240395



SUSE-SU-2025:1326-1: important: Security update for pgadmin4


# Security update for pgadmin4

Announcement ID: SUSE-SU-2025:1326-1
Release Date: 2025-04-16T08:37:33Z
Rating: important
References:

* bsc#1224295
* bsc#1234840
* bsc#1239308

Cross-References:

* CVE-2023-1907
* CVE-2024-4068
* CVE-2025-27152

CVSS scores:

* CVE-2023-1907 ( SUSE ): 7.5
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-1907 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2023-1907 ( NVD ): 8.0 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
* CVE-2024-4068 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-27152 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-27152 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-27152 ( NVD ): 7.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Affected Products:

* openSUSE Leap 15.3
* Python 3 Module 15-SP6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves three vulnerabilities can now be installed.

## Description:

This update for pgadmin4 fixes the following issues:

* CVE-2025-27152: Fixed SSRF and creadential leakage due to requests sent to
absolute URL even when baseURL is set (bsc#1239308)
* CVE-2023-1907: Fixed an issue which could result in users being
authenticated in another user's session if two users authenticate
simultaneously via ldap (bsc#1234840)
* CVE-2024-4068: Fixed a possible memory exhaustion (bsc#1224295)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.3
zypper in -t patch SUSE-2025-1326=1

* Python 3 Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2025-1326=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1326=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1326=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1326=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1326=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1326=1

* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1326=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1326=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1326=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1326=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1326=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1326=1

* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1326=1

* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2025-1326=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1326=1

* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2025-1326=1

## Package List:

* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* pgadmin4-debuginfo-4.30-150300.3.18.1
* pgadmin4-4.30-150300.3.18.1
* openSUSE Leap 15.3 (noarch)
* pgadmin4-web-4.30-150300.3.18.1
* pgadmin4-web-uwsgi-4.30-150300.3.18.1
* pgadmin4-doc-4.30-150300.3.18.1
* Python 3 Module 15-SP6 (s390x)
* pgadmin4-debuginfo-4.30-150300.3.18.1
* pgadmin4-4.30-150300.3.18.1
* Python 3 Module 15-SP6 (noarch)
* pgadmin4-web-4.30-150300.3.18.1
* pgadmin4-doc-4.30-150300.3.18.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* pgadmin4-debuginfo-4.30-150300.3.18.1
* pgadmin4-4.30-150300.3.18.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* pgadmin4-web-4.30-150300.3.18.1
* pgadmin4-doc-4.30-150300.3.18.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* pgadmin4-debuginfo-4.30-150300.3.18.1
* pgadmin4-4.30-150300.3.18.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* pgadmin4-web-4.30-150300.3.18.1
* pgadmin4-doc-4.30-150300.3.18.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* pgadmin4-debuginfo-4.30-150300.3.18.1
* pgadmin4-4.30-150300.3.18.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* pgadmin4-web-4.30-150300.3.18.1
* pgadmin4-doc-4.30-150300.3.18.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* pgadmin4-debuginfo-4.30-150300.3.18.1
* pgadmin4-4.30-150300.3.18.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* pgadmin4-web-4.30-150300.3.18.1
* pgadmin4-doc-4.30-150300.3.18.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* pgadmin4-debuginfo-4.30-150300.3.18.1
* pgadmin4-4.30-150300.3.18.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* pgadmin4-web-4.30-150300.3.18.1
* pgadmin4-doc-4.30-150300.3.18.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64)
* pgadmin4-debuginfo-4.30-150300.3.18.1
* pgadmin4-4.30-150300.3.18.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (noarch)
* pgadmin4-web-4.30-150300.3.18.1
* pgadmin4-doc-4.30-150300.3.18.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* pgadmin4-debuginfo-4.30-150300.3.18.1
* pgadmin4-4.30-150300.3.18.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* pgadmin4-web-4.30-150300.3.18.1
* pgadmin4-doc-4.30-150300.3.18.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* pgadmin4-debuginfo-4.30-150300.3.18.1
* pgadmin4-4.30-150300.3.18.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* pgadmin4-web-4.30-150300.3.18.1
* pgadmin4-doc-4.30-150300.3.18.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* pgadmin4-debuginfo-4.30-150300.3.18.1
* pgadmin4-4.30-150300.3.18.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* pgadmin4-web-4.30-150300.3.18.1
* pgadmin4-doc-4.30-150300.3.18.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* pgadmin4-debuginfo-4.30-150300.3.18.1
* pgadmin4-4.30-150300.3.18.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* pgadmin4-web-4.30-150300.3.18.1
* pgadmin4-doc-4.30-150300.3.18.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* pgadmin4-debuginfo-4.30-150300.3.18.1
* pgadmin4-4.30-150300.3.18.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* pgadmin4-web-4.30-150300.3.18.1
* pgadmin4-doc-4.30-150300.3.18.1
* SUSE Manager Proxy 4.3 (x86_64)
* pgadmin4-debuginfo-4.30-150300.3.18.1
* pgadmin4-4.30-150300.3.18.1
* SUSE Manager Proxy 4.3 (noarch)
* pgadmin4-web-4.30-150300.3.18.1
* pgadmin4-doc-4.30-150300.3.18.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* pgadmin4-debuginfo-4.30-150300.3.18.1
* pgadmin4-4.30-150300.3.18.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* pgadmin4-web-4.30-150300.3.18.1
* pgadmin4-doc-4.30-150300.3.18.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* pgadmin4-debuginfo-4.30-150300.3.18.1
* pgadmin4-4.30-150300.3.18.1
* SUSE Manager Server 4.3 (noarch)
* pgadmin4-web-4.30-150300.3.18.1
* pgadmin4-doc-4.30-150300.3.18.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* pgadmin4-debuginfo-4.30-150300.3.18.1
* pgadmin4-4.30-150300.3.18.1
* SUSE Enterprise Storage 7.1 (noarch)
* pgadmin4-web-4.30-150300.3.18.1
* pgadmin4-doc-4.30-150300.3.18.1

## References:

* https://www.suse.com/security/cve/CVE-2023-1907.html
* https://www.suse.com/security/cve/CVE-2024-4068.html
* https://www.suse.com/security/cve/CVE-2025-27152.html
* https://bugzilla.suse.com/show_bug.cgi?id=1224295
* https://bugzilla.suse.com/show_bug.cgi?id=1234840
* https://bugzilla.suse.com/show_bug.cgi?id=1239308



SUSE-SU-2025:1331-1: important: Security update for webkit2gtk3


# Security update for webkit2gtk3

Announcement ID: SUSE-SU-2025:1331-1
Release Date: 2025-04-16T15:15:09Z
Rating: important
References:

* bsc#1240958
* bsc#1240961
* bsc#1240962
* bsc#1240963
* bsc#1240964
* bsc#1240986
* bsc#1240987

Cross-References:

* CVE-2024-54551
* CVE-2025-24208
* CVE-2025-24209
* CVE-2025-24213
* CVE-2025-24216
* CVE-2025-24264
* CVE-2025-30427

CVSS scores:

* CVE-2024-54551 ( SUSE ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-54551 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2024-54551 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-24208 ( SUSE ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-24208 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2025-24208 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2025-24209 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-24209 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-24209 ( NVD ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-24213 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-24213 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-24213 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-24216 ( SUSE ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-24216 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-24216 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-24264 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-24264 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-24264 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-30427 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-30427 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-30427 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

Affected Products:

* Basesystem Module 15-SP6
* Desktop Applications Module 15-SP6
* Development Tools Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves seven vulnerabilities can now be installed.

## Description:

This update for webkit2gtk3 fixes the following issues:

* Update to version 2.48.1
* CVE-2024-54551: improper memory handling may lead to a denial-of-service
when processing certain web content (bsc#1240962)
* CVE-2025-24208: permissions issue may lead to a cross-site scripting attack
when loading a malicious iframe (bsc#1240961)
* CVE-2025-24209: buffer overflow may lead to crash when processing
maliciously crafted web content (bsc#1240964)
* CVE-2025-24213: type confusion issue may lead to memory corruption
(bsc#1240963)
* CVE-2025-24216: improper memory handling may lead to an unexpected crash
when processing certain web content (bsc#1240986)
* CVE-2025-24264: improper memory handling may lead to unexpected crash when
processing certain web content (bsc#1240987)
* CVE-2025-30427: use-after-free issue may lead to an unexpected Safari crash
when processing maliciously crafted web content (bsc#1240958)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2025-1331=1 openSUSE-SLE-15.6-2025-1331=1

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1331=1

* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-1331=1

* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-1331=1

## Package List:

* openSUSE Leap 15.6 (noarch)
* WebKitGTK-6.0-lang-2.48.1-150600.12.36.5
* WebKitGTK-4.1-lang-2.48.1-150600.12.36.5
* WebKitGTK-4.0-lang-2.48.1-150600.12.36.5
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* webkit2gtk3-soup2-debugsource-2.48.1-150600.12.36.5
* webkitgtk-6_0-injected-bundles-2.48.1-150600.12.36.5
* libjavascriptcoregtk-6_0-1-2.48.1-150600.12.36.5
* typelib-1_0-JavaScriptCore-4_0-2.48.1-150600.12.36.5
* webkit2gtk4-devel-2.48.1-150600.12.36.5
* libjavascriptcoregtk-4_1-0-2.48.1-150600.12.36.5
* typelib-1_0-JavaScriptCore-6_0-2.48.1-150600.12.36.5
* libwebkit2gtk-4_1-0-debuginfo-2.48.1-150600.12.36.5
* webkit-jsc-4.1-debuginfo-2.48.1-150600.12.36.5
* webkit2gtk-4_1-injected-bundles-debuginfo-2.48.1-150600.12.36.5
* libjavascriptcoregtk-6_0-1-debuginfo-2.48.1-150600.12.36.5
* libwebkit2gtk-4_0-37-debuginfo-2.48.1-150600.12.36.5
* webkit2gtk3-debugsource-2.48.1-150600.12.36.5
* libjavascriptcoregtk-4_1-0-debuginfo-2.48.1-150600.12.36.5
* typelib-1_0-WebKit2-4_0-2.48.1-150600.12.36.5
* typelib-1_0-WebKitWebProcessExtension-6_0-2.48.1-150600.12.36.5
* webkit2gtk3-soup2-devel-2.48.1-150600.12.36.5
* webkit2gtk3-soup2-minibrowser-debuginfo-2.48.1-150600.12.36.5
* webkit2gtk4-minibrowser-2.48.1-150600.12.36.5
* webkit2gtk3-minibrowser-debuginfo-2.48.1-150600.12.36.5
* webkit2gtk-4_0-injected-bundles-2.48.1-150600.12.36.5
* typelib-1_0-WebKit2WebExtension-4_0-2.48.1-150600.12.36.5
* typelib-1_0-WebKit2WebExtension-4_1-2.48.1-150600.12.36.5
* webkit2gtk4-debugsource-2.48.1-150600.12.36.5
* webkit-jsc-6.0-2.48.1-150600.12.36.5
* libwebkit2gtk-4_1-0-2.48.1-150600.12.36.5
* webkit2gtk3-minibrowser-2.48.1-150600.12.36.5
* webkit-jsc-4-2.48.1-150600.12.36.5
* libjavascriptcoregtk-4_0-18-2.48.1-150600.12.36.5
* webkit-jsc-4-debuginfo-2.48.1-150600.12.36.5
* libwebkit2gtk-4_0-37-2.48.1-150600.12.36.5
* typelib-1_0-JavaScriptCore-4_1-2.48.1-150600.12.36.5
* webkit-jsc-4.1-2.48.1-150600.12.36.5
* webkit2gtk-4_0-injected-bundles-debuginfo-2.48.1-150600.12.36.5
* libwebkitgtk-6_0-4-debuginfo-2.48.1-150600.12.36.5
* webkit-jsc-6.0-debuginfo-2.48.1-150600.12.36.5
* webkit2gtk3-devel-2.48.1-150600.12.36.5
* webkit2gtk3-soup2-minibrowser-2.48.1-150600.12.36.5
* libwebkitgtk-6_0-4-2.48.1-150600.12.36.5
* webkit2gtk4-minibrowser-debuginfo-2.48.1-150600.12.36.5
* libjavascriptcoregtk-4_0-18-debuginfo-2.48.1-150600.12.36.5
* webkitgtk-6_0-injected-bundles-debuginfo-2.48.1-150600.12.36.5
* typelib-1_0-WebKit2-4_1-2.48.1-150600.12.36.5
* webkit2gtk-4_1-injected-bundles-2.48.1-150600.12.36.5
* typelib-1_0-WebKit-6_0-2.48.1-150600.12.36.5
* openSUSE Leap 15.6 (x86_64)
* libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.48.1-150600.12.36.5
* libwebkit2gtk-4_1-0-32bit-debuginfo-2.48.1-150600.12.36.5
* libwebkit2gtk-4_1-0-32bit-2.48.1-150600.12.36.5
* libjavascriptcoregtk-4_1-0-32bit-2.48.1-150600.12.36.5
* libjavascriptcoregtk-4_1-0-32bit-debuginfo-2.48.1-150600.12.36.5
* libwebkit2gtk-4_0-37-32bit-2.48.1-150600.12.36.5
* libjavascriptcoregtk-4_0-18-32bit-2.48.1-150600.12.36.5
* libwebkit2gtk-4_0-37-32bit-debuginfo-2.48.1-150600.12.36.5
* openSUSE Leap 15.6 (aarch64_ilp32)
* libjavascriptcoregtk-4_0-18-64bit-2.48.1-150600.12.36.5
* libjavascriptcoregtk-4_0-18-64bit-debuginfo-2.48.1-150600.12.36.5
* libwebkit2gtk-4_1-0-64bit-debuginfo-2.48.1-150600.12.36.5
* libjavascriptcoregtk-4_1-0-64bit-debuginfo-2.48.1-150600.12.36.5
* libwebkit2gtk-4_1-0-64bit-2.48.1-150600.12.36.5
* libwebkit2gtk-4_0-37-64bit-2.48.1-150600.12.36.5
* libjavascriptcoregtk-4_1-0-64bit-2.48.1-150600.12.36.5
* libwebkit2gtk-4_0-37-64bit-debuginfo-2.48.1-150600.12.36.5
* Basesystem Module 15-SP6 (noarch)
* WebKitGTK-6.0-lang-2.48.1-150600.12.36.5
* WebKitGTK-4.0-lang-2.48.1-150600.12.36.5
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* webkit2gtk3-soup2-debugsource-2.48.1-150600.12.36.5
* libwebkitgtk-6_0-4-2.48.1-150600.12.36.5
* libjavascriptcoregtk-6_0-1-2.48.1-150600.12.36.5
* webkit2gtk4-debugsource-2.48.1-150600.12.36.5
* libjavascriptcoregtk-4_0-18-debuginfo-2.48.1-150600.12.36.5
* typelib-1_0-JavaScriptCore-4_0-2.48.1-150600.12.36.5
* typelib-1_0-WebKit2WebExtension-4_0-2.48.1-150600.12.36.5
* webkitgtk-6_0-injected-bundles-2.48.1-150600.12.36.5
* typelib-1_0-WebKit2-4_0-2.48.1-150600.12.36.5
* webkitgtk-6_0-injected-bundles-debuginfo-2.48.1-150600.12.36.5
* libjavascriptcoregtk-4_0-18-2.48.1-150600.12.36.5
* webkit2gtk3-soup2-devel-2.48.1-150600.12.36.5
* libwebkit2gtk-4_0-37-2.48.1-150600.12.36.5
* webkit2gtk-4_0-injected-bundles-2.48.1-150600.12.36.5
* webkit2gtk-4_0-injected-bundles-debuginfo-2.48.1-150600.12.36.5
* libwebkitgtk-6_0-4-debuginfo-2.48.1-150600.12.36.5
* libjavascriptcoregtk-6_0-1-debuginfo-2.48.1-150600.12.36.5
* libwebkit2gtk-4_0-37-debuginfo-2.48.1-150600.12.36.5
* Desktop Applications Module 15-SP6 (noarch)
* WebKitGTK-4.1-lang-2.48.1-150600.12.36.5
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libjavascriptcoregtk-4_1-0-2.48.1-150600.12.36.5
* libwebkit2gtk-4_1-0-debuginfo-2.48.1-150600.12.36.5
* typelib-1_0-WebKit2-4_1-2.48.1-150600.12.36.5
* libjavascriptcoregtk-4_1-0-debuginfo-2.48.1-150600.12.36.5
* webkit2gtk-4_1-injected-bundles-debuginfo-2.48.1-150600.12.36.5
* webkit2gtk-4_1-injected-bundles-2.48.1-150600.12.36.5
* typelib-1_0-JavaScriptCore-4_1-2.48.1-150600.12.36.5
* typelib-1_0-WebKit2WebExtension-4_1-2.48.1-150600.12.36.5
* webkit2gtk3-debugsource-2.48.1-150600.12.36.5
* webkit2gtk3-devel-2.48.1-150600.12.36.5
* libwebkit2gtk-4_1-0-2.48.1-150600.12.36.5
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* webkit2gtk4-devel-2.48.1-150600.12.36.5
* typelib-1_0-JavaScriptCore-6_0-2.48.1-150600.12.36.5
* typelib-1_0-WebKitWebProcessExtension-6_0-2.48.1-150600.12.36.5
* typelib-1_0-WebKit-6_0-2.48.1-150600.12.36.5
* webkit2gtk4-debugsource-2.48.1-150600.12.36.5

## References:

* https://www.suse.com/security/cve/CVE-2024-54551.html
* https://www.suse.com/security/cve/CVE-2025-24208.html
* https://www.suse.com/security/cve/CVE-2025-24209.html
* https://www.suse.com/security/cve/CVE-2025-24213.html
* https://www.suse.com/security/cve/CVE-2025-24216.html
* https://www.suse.com/security/cve/CVE-2025-24264.html
* https://www.suse.com/security/cve/CVE-2025-30427.html
* https://bugzilla.suse.com/show_bug.cgi?id=1240958
* https://bugzilla.suse.com/show_bug.cgi?id=1240961
* https://bugzilla.suse.com/show_bug.cgi?id=1240962
* https://bugzilla.suse.com/show_bug.cgi?id=1240963
* https://bugzilla.suse.com/show_bug.cgi?id=1240964
* https://bugzilla.suse.com/show_bug.cgi?id=1240986
* https://bugzilla.suse.com/show_bug.cgi?id=1240987