SB20260422219 - Red Hat Enterprise Linux 9 update for webkit2gtk3
Published: April 22, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 18 secuirty vulnerabilities.
1) Memory corruption (CVE-ID: CVE-2025-43213)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in WebKit. A remote attacker can trick the victim into opening a specially crafted file and crash the browser.
2) Memory corruption (CVE-ID: CVE-2025-43214)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in WebKit. A remote attacker can trick the victim into opening a specially crafted file and crash the browser.
3) Use-after-free (CVE-ID: CVE-2025-43457)
The vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to a use-after-free error in WebKit. A remote attacker can trick the victim into visiting a specially crafted website and crash the browser.
4) Use-after-free (CVE-ID: CVE-2025-43511)
The vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to a use-after-free error in WebKit Web Inspector. A remote attacker can trick the victim into visiting a specially crafted website and perform a denial of service attack.
5) Improper Initialization (CVE-ID: CVE-2025-46299)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to improper initialization in WebKit. A remote attacker can trick the victim into visiting a specially crafted website and disclose internal states of the app.
6) Buffer overflow (CVE-ID: CVE-2026-20608)
The vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to a boundary error in WebKit when processing HTML content. A remote attacker can trick the victim into visiting a specially crafted website and crash the browser.
7) Buffer overflow (CVE-ID: CVE-2026-20635)
The vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to a boundary error in WebKit when processing HTML content. A remote attacker can trick the victim into visiting a specially crafted website and crash the browser.
8) Buffer overflow (CVE-ID: CVE-2026-20636)
The vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to a boundary error in WebKit when processing HTML content. A remote attacker can trick the victim into visiting a specially crafted website and crash the browser.
9) Buffer overflow (CVE-ID: CVE-2026-20644)
The vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to a boundary error in WebKit when processing HTML content. A remote attacker can trick the victim into visiting a specially crafted website and crash the browser.
10) Buffer overflow (CVE-ID: CVE-2026-20652)
The vulnerability allows a remote attacker to perform a denial of service attack.
The vulnerability exists due to a boundary error in WebKit when processing HTML content. A remote attacker can trick the victim into visiting a specially crafted website and crash the browser.
11) State Issues (CVE-ID: CVE-2026-20676)
The vulnerability allows a remote attacker to track website users.
The vulnerability exists due to a state issue in WebKit. A remote attacker can track users through Safari web extensions.
12) Protection mechanism failure (CVE-ID: CVE-2026-20643)
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to insufficient implementation of security measures within the Navigation API in WebKit. A remote attacker can trick the victim into visiting a specially crafted website and bypass Same Origin Policy.
13) Memory corruption (CVE-ID: CVE-2026-20664)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in WebKit. A remote attacker can trick the victim into opening a specially crafted file and perform an unexpected process crash.
14) State Issues (CVE-ID: CVE-2026-20665)
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to a state management issue in WebKit. A remote attacker can trick the victim into visiting a specially crafted website and prevent Content Security Policy from being enforced.
15) Information disclosure (CVE-ID: CVE-2026-20691)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the WebKit Sandboxing component. A remote attacker can gain fingerprint the user.
16) Memory corruption (CVE-ID: CVE-2026-28857)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in WebKit. A remote attacker can trick the victim into opening a specially crafted file and perform an unexpected process crash.
17) Memory corruption (CVE-ID: CVE-2026-28859)
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to improper input validation in WebKit when processing web content. A remote attacker can trick the victim into visiting a specially crafted website and force the browser into processing restricted web content outside the sandbox.
18) Universal cross-site scripting (CVE-ID: CVE-2026-28871)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in WebKit. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of an arbitrary website.
Remediation
Install update from vendor's website.