<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE3-SA-2025-0069</id>
    <title>An update for webkit2gtk5.0 is now available for HCE 3.0</title>
    <severity>Critical</severity>
    <release>HCE 3.0</release>
    <issued date="2025-10-09 06:38:17"/>
    <updated date="2025-10-09 06:38:17"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-30293" id="CVE-2022-30293" title="CVE-2022-30293 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-40780" id="CVE-2024-40780" title="CVE-2024-40780 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-32373" id="CVE-2023-32373" title="CVE-2023-32373 Base Score: 8.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-40779" id="CVE-2024-40779" title="CVE-2024-40779 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2021-42762" id="CVE-2021-42762" title="CVE-2021-42762 Base Score: 5.3 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-30294" id="CVE-2022-30294" title="CVE-2022-30294 Base Score: 9.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-39928" id="CVE-2023-39928" title="CVE-2023-39928 Base Score: 8.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-32409" id="CVE-2023-32409" title="CVE-2023-32409 Base Score: 8.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2024-4558" id="CVE-2024-4558" title="CVE-2024-4558 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-28204" id="CVE-2023-28204" title="CVE-2023-28204 Base Score: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" type="cve"/>
    </references>
    <description>Security Fix(es):

In WebKitGTK through 2.36.0 (and WPE WebKit), there is a heap-based buffer overflow in WebCore::TextureMapperLayer::setContentsLayer in WebCore/platform/graphics/texmap/TextureMapperLayer.cpp. (CVE-2022-30293)

An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash. (CVE-2024-40780)

A use after free vulnerability was found in the webkitgtk package. Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2023-32373)

An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to an unexpected process crash. (CVE-2024-40779)

BubblewrapLauncher.cpp in WebKitGTK and WPE WebKit before 2.34.1 allows a limited sandbox bypass that allows a sandboxed process to trick host processes into thinking the sandboxed process is not confined by the sandbox, by abusing VFS syscalls that manipulate its filesystem namespace. The impact is limited to host services that create UNIX sockets that WebKit mounts inside its sandbox, and the sandboxed process remains otherwise confined. NOTE: this is similar to CVE-2021-41133. (CVE-2021-42762)

In WebKitGTK through 2.36.0 (and WPE WebKit), there is a use-after-free in WebCore::TextureMapperLayer::setContentsLayer in WebCore/platform/graphics/texmap/TextureMapperLayer.cpp. (CVE-2022-30294)

A use-after-free vulnerability exists in the MediaRecorder API of Webkit WebKitGTK 2.40.5. A specially crafted web page can abuse this vulnerability to cause memory corruption and potentially arbitrary code execution. A user would need to to visit a malicious webpage to trigger this vulnerability. (CVE-2023-39928)

A flaw was found in the WebGPU, part of the Webkit project. This flaw allows a remote attacker to break out of the Web Content sandbox. (CVE-2023-32409)

Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) (CVE-2024-4558)

A flaw was found in the webkitgtk package. An out of bounds read may be possible when processing malicious web content, which can lead to information disclosure. (CVE-2023-28204)
</description>
    <pkglist>
      <collection short="HCE 3.0" package="webkit2gtk5.0">
        <name>HCE 3.0</name>
        <package arch="x86_64" name="jsc5.0" version="2.38.2" release="10.hce3">
          <filename>jsc5.0-2.38.2-10.hce3.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="jsc5.0-devel" version="2.38.2" release="10.hce3">
          <filename>jsc5.0-devel-2.38.2-10.hce3.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="webkit2gtk5.0" version="2.38.2" release="10.hce3">
          <filename>webkit2gtk5.0-2.38.2-10.hce3.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="webkit2gtk5.0-devel" version="2.38.2" release="10.hce3">
          <filename>webkit2gtk5.0-devel-2.38.2-10.hce3.x86_64.rpm</filename>
        </package>
        <package arch="aarch64" name="jsc5.0" version="2.38.2" release="10.hce3">
          <filename>jsc5.0-2.38.2-10.hce3.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="jsc5.0-devel" version="2.38.2" release="10.hce3">
          <filename>jsc5.0-devel-2.38.2-10.hce3.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="webkit2gtk5.0" version="2.38.2" release="10.hce3">
          <filename>webkit2gtk5.0-2.38.2-10.hce3.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="webkit2gtk5.0-devel" version="2.38.2" release="10.hce3">
          <filename>webkit2gtk5.0-devel-2.38.2-10.hce3.aarch64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
