Vulnerability scanners (such as Nessus or Qualys) may report high-severity security findings on Linux servers hosting AutoSys components. A common example is **Vulnerability ID 761878** (SUSE-SU-2026:1150-1) related to `webkit2gtk3`.
These packages are often installed by default as part of a standard OS build or graphical desktop environment but may not be updated during standard application patching cycles.
Product: AutoSys Workload Automation
Component: Scheduler, Application Server, Web UI (WCC), Embedded Entitlements Manager (EEM)
Operating System: Linux (SUSE Enterprise Linux 15, RHEL, etc.)
AutoSys and its core security component, CA Embedded Entitlements Manager (EEM), are console-based or web-based applications. They do not utilize graphical desktop libraries or GNOME-based utilities for their core operations. The vulnerability exists in OS-level packages that were included in the server's original image but are not dependencies for AutoSys.
It has been confirmed that AutoSys does not require `webkit2gtk3` or its associated graphical libraries. These packages can be safely removed to remediate security findings.
Impacted Package List
The following packages (and their variations) are typically identified as unneeded for AutoSys operations:
libgoa-backend-1_0-1libjavascriptcoregtk-4_0-18libmutter0libwebkit2gtk-4_0-37libyelp0muttermutter-datamutter-langtypelib-1_0-JavaScriptCore-4_0typelib-1_0-WebKit2-4_0webkit2gtk-4_0-injected-bundlesyelpyelp-langyelp-xslzenityzenity-langRemediation Steps
rpm -q --whatrequires <package_name>zypper remove libwebkit2gtk-4_0-37 zenity yelp