{"schema_version": "1.7.0", "id": "RLSA-2026:9692", "modified": "2026-04-24T12:08:46.000356Z", "published": "2026-04-24T12:03:31.152911Z", "upstream": ["CVE-2025-43213", "CVE-2025-43214", "CVE-2025-43457", "CVE-2025-43511", "CVE-2025-46299", "CVE-2026-20608", "CVE-2026-20635", "CVE-2026-20636", "CVE-2026-20643", "CVE-2026-20644", "CVE-2026-20652", "CVE-2026-20664", "CVE-2026-20665", "CVE-2026-20676", "CVE-2026-20691", "CVE-2026-28857", "CVE-2026-28859", "CVE-2026-28871"], "summary": "Important: webkit2gtk3 security update", "details": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-43213)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-43214)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-43457)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-43511)\n\n* webkitgtk: Processing maliciously crafted web content may disclose internal states of the app (CVE-2025-46299)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2026-20608)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2026-20635)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2026-20636)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2026-20644)\n\n* webkitgtk: A remote attacker may be able to cause a denial-of-service (CVE-2026-20652)\n\n* webkitgtk: A website may be able to track users through Safari web extensions (CVE-2026-20676)\n\n* webkitgtk: Processing maliciously crafted web content may bypass Same Origin Policy (CVE-2026-20643)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2026-20664)\n\n* webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2026-20665)\n\n* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2026-20691)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2026-28857)\n\n* webkitgtk: A malicious website may be able to process restricted web content outside the sandbox (CVE-2026-28859)\n\n* webkitgtk: Visiting a maliciously crafted website may lead to a cross-site scripting attack (CVE-2026-28871)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "severity": [{"type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}], "affected": [{"package": {"ecosystem": "Rocky Linux:9", "name": "webkit2gtk3", "purl": "pkg:rpm/rocky-linux/webkit2gtk3?distro=rocky-linux-9&epoch=0"}, "ranges": [{"type": "ECOSYSTEM", "events": [{"introduced": "0"}, {"fixed": "0:2.52.3-0.el9_7.1"}], "database_specific": {"yum_repository": "AppStream"}}]}], "references": [{"type": "ADVISORY", "url": "https://errata.rockylinux.org/RLSA-2026:9692"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448781"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448782"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448786"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448787"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448788"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448789"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448790"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448791"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448792"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448793"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448794"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453000"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453001"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453002"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453003"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453004"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453006"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453008"}], "credits": [{"name": "Rocky Enterprise Software Foundation"}, {"name": "Red Hat"}]}