{"schema_version": "1.7.0", "id": "RLSA-2025:22789", "modified": "2025-12-09T09:03:01.510226Z", "published": "2025-12-09T09:02:00.929297Z", "upstream": ["CVE-2023-43000", "CVE-2025-13502", "CVE-2025-13947", "CVE-2025-43392", "CVE-2025-43419", "CVE-2025-43421", "CVE-2025-43425", "CVE-2025-43427", "CVE-2025-43429", "CVE-2025-43430", "CVE-2025-43431", "CVE-2025-43432", "CVE-2025-43434", "CVE-2025-43440", "CVE-2025-43443", "CVE-2025-43458", "CVE-2025-43480", "CVE-2025-66287"], "summary": "Important: webkit2gtk3 security update", "details": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkit: WebKitGTK / WPE WebKit: Out-of-bounds read and integer underflow vulnerability leading to DoS (CVE-2025-13502)\n\n* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2023-43000)\n\n* webkitgtk: A website may exfiltrate image data cross-origin (CVE-2025-43392)\n\n* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-43419)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43425)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43427)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43429)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43430)\n\n* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-43431)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43432)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-43434)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43440)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43443)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2025-43480)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43421)\n\n* webkit: WebKitGTK: Remote user-assisted information disclosure via file drag-and-drop (CVE-2025-13947)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43458)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-66287)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "severity": [{"type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}], "affected": [{"package": {"ecosystem": "Rocky Linux:8", "name": "webkit2gtk3", "purl": "pkg:rpm/rocky-linux/webkit2gtk3?distro=rocky-linux-8&epoch=0"}, "ranges": [{"type": "ECOSYSTEM", "events": [{"introduced": "0"}, {"fixed": "0:2.50.3-1.el8_10"}], "database_specific": {"yum_repository": "AppStream"}}]}], "references": [{"type": "ADVISORY", "url": "https://errata.rockylinux.org/RLSA-2025:22789"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416300"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416324"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416325"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416326"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416327"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416329"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416330"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416331"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416332"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416334"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416335"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416336"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416337"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416338"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416355"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418576"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418855"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418857"}], "credits": [{"name": "Rocky Enterprise Software Foundation"}, {"name": "Red Hat"}]}