<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE2-SA-2025-0259</id>
    <title>An update for yelp is now available for HCE 2.0</title>
    <severity>Important</severity>
    <release>HCE 2.0</release>
    <issued date="2025-09-23 11:51:50"/>
    <updated date="2025-09-23 11:51:50"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-3155" id="CVE-2025-3155" title="CVE-2025-3155 Base Score: 7.4 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" type="cve"/>
    </references>
    <description>Security Fix(es):

A flaw was found in Yelp. The Gnome user help application allows the help document to execute arbitrary scripts. This vulnerability allows malicious users to input help documents, which may exfiltrate user files to an external environment. (CVE-2025-3155)
</description>
    <pkglist>
      <collection short="HCE 2.0" package="yelp">
        <name>HCE 2.0</name>
        <package arch="aarch64" name="yelp" version="3.38.3" release="1.r1.hce2">
          <filename>yelp-3.38.3-1.r1.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="yelp-devel" version="3.38.3" release="1.r1.hce2">
          <filename>yelp-devel-3.38.3-1.r1.hce2.aarch64.rpm</filename>
        </package>
        <package arch="noarch" name="yelp-help" version="3.38.3" release="1.r1.hce2">
          <filename>yelp-help-3.38.3-1.r1.hce2.noarch.rpm</filename>
        </package>
        <package arch="x86_64" name="yelp" version="3.38.3" release="1.r1.hce2">
          <filename>yelp-3.38.3-1.r1.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="yelp-devel" version="3.38.3" release="1.r1.hce2">
          <filename>yelp-devel-3.38.3-1.r1.hce2.x86_64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
