webkit2gtk3 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the webkit2gtk3 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Buffer Overflow

<0:2.50.3-1.el9_7
  • H
CVE-2025-43430

<0:2.50.3-1.el9_7
  • H
CVE-2025-43434

<0:2.50.3-1.el9_7
  • H
CVE-2025-43440

<0:2.50.3-1.el9_7
  • H
CVE-2025-43480

<0:2.50.3-1.el9_7
  • H
CVE-2025-43443

<0:2.50.3-1.el9_7
  • H
CVE-2025-43425

<0:2.50.3-1.el9_7
  • H
CVE-2025-43458

<0:2.50.3-1.el9_7
  • H
CVE-2025-43427

<0:2.50.3-1.el9_7
  • H
CVE-2025-43421

<0:2.50.3-1.el9_7
  • H
CVE-2025-43419

<0:2.50.3-1.el9_7
  • H
Integer Overflow or Wraparound

<0:2.50.3-1.el9_7
  • H
CVE-2025-43429

<0:2.50.3-1.el9_7
  • H
CVE-2025-13947

<0:2.50.3-1.el9_7
  • H
CVE-2023-43000

<0:2.50.3-1.el9_7
  • H
CVE-2025-43392

<0:2.50.3-1.el9_7
  • H
CVE-2025-43432

<0:2.50.3-1.el9_7
  • H
Out-of-bounds Write

<0:2.50.3-1.el9_7
  • H
CVE-2025-43342

<0:2.50.1-1.el9_7
  • H
CVE-2025-43368

<0:2.50.1-1.el9_7
  • H
CVE-2025-43343

<0:2.50.1-1.el9_7
  • H
CVE-2025-43272

<0:2.50.1-1.el9_7
  • H
CVE-2025-43356

<0:2.50.1-1.el9_7
  • H
CVE-2025-43211

<0:2.48.5-1.el9_6
  • H
CVE-2025-31278

<0:2.48.5-1.el9_6
  • H
CVE-2025-43227

<0:2.48.5-1.el9_6
  • H
CVE-2025-43265

<0:2.48.5-1.el9_6
  • H
CVE-2025-43240

<0:2.48.5-1.el9_6
  • H
CVE-2025-43216

<0:2.48.5-1.el9_6
  • H
CVE-2025-43212

<0:2.48.5-1.el9_6
  • H
Improper Input Validation

<0:2.48.5-1.el9_6
  • H
CVE-2025-31273

<0:2.48.5-1.el9_6
  • H
CVE-2025-31205

<0:2.48.2-1.el9_6
  • H
CVE-2025-31257

<0:2.48.2-1.el9_6
  • H
CVE-2025-24209

<0:2.48.1-1.el9_6
  • H
CVE-2024-44192

<0:2.48.1-1.el9_6
  • H
CVE-2024-54467

<0:2.48.1-1.el9_6
  • H
CVE-2024-54551

<0:2.48.1-1.el9_6
  • H
CVE-2025-24216

<0:2.48.1-1.el9_6
  • H
CVE-2025-30427

<0:2.48.1-1.el9_6
  • H
CVE-2025-24208

<0:2.48.1-1.el9_6
  • H
Out-of-bounds Write

<0:2.46.6-2.el9_5
  • H
CVE-2025-24143

<0:2.46.6-1.el9_5
  • H
Out-of-bounds Write

<0:2.46.6-1.el9_5
  • H
CVE-2025-24162

<0:2.46.6-1.el9_5
  • H
CVE-2025-24158

<0:2.46.6-1.el9_5
  • H
Arbitrary Command Injection

<0:2.46.6-1.el9_5
  • H
CVE-2024-54502

<0:2.46.5-1.el9_5
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.46.5-1.el9_5
  • H
CVE-2024-54479

<0:2.46.5-1.el9_5
  • H
CVE-2024-54508

<0:2.46.5-1.el9_5
  • H
Cross-site Scripting (XSS)

<0:2.46.3-2.el9_5
  • H
CVE-2024-44185

<0:2.46.3-1.el9_5
  • H
CVE-2024-44296

<0:2.46.3-1.el9_5
  • H
Out-of-bounds Write

<0:2.46.3-1.el9_5
  • H
Use After Free

<0:2.44.3-2.el9
  • H
CVE-2023-42956

<0:2.44.3-2.el9
  • H
CVE-2023-42950

<0:2.44.3-2.el9
  • H
Authentication Bypass

<0:2.44.3-2.el9
  • H
CVE-2024-40789

<0:2.46.1-2.el9_4
  • H
CVE-2024-23271

<0:2.46.1-2.el9_4
  • H
CVE-2024-27820

<0:2.46.1-2.el9_4
  • H
Use After Free

<0:2.46.1-2.el9_4
  • H
Out-of-Bounds

<0:2.46.1-2.el9_4
  • H
CVE-2024-27838

<0:2.46.1-2.el9_4
  • H
Out-of-bounds Read

<0:2.46.1-2.el9_4
  • H
CVE-2024-40866

<0:2.46.3-1.el9_5
  • H
Out-of-bounds Read

<0:2.46.1-2.el9_4
  • H
Use After Free

<0:2.46.1-2.el9_4
  • H
Origin Validation Error

<0:2.46.3-1.el9_5
  • H
Use After Free

<0:2.42.5-1.el9
  • H
CVE-2024-23206

<0:2.42.5-1.el9
  • H
Out-of-Bounds

<0:2.42.5-1.el9
  • H
Resource Management Errors

<0:2.42.5-1.el9
  • H
CVE-2023-42883

<0:2.42.5-1.el9
  • H
Use After Free

<0:2.42.5-1.el9
  • H
CVE-2024-23213

<0:2.42.5-1.el9
  • H
CVE-2023-42852

<0:2.42.5-1.el9
  • H
CVE-2023-32359

<0:2.42.5-1.el9
  • H
CVE-2023-42890

<0:2.42.5-1.el9
  • H
Out-of-bounds Write

<0:2.40.5-1.el9_3.1
  • H
Use After Free

<0:2.40.5-1.el9
  • H
CVE-2023-38595

<0:2.40.5-1.el9
  • H
CVE-2023-38599

<0:2.40.5-1.el9
  • H
CVE-2023-27932

<0:2.40.5-1.el9
  • H
CVE-2023-40397

<0:2.40.5-1.el9
  • H
CVE-2023-38133

<0:2.40.5-1.el9
  • H
CVE-2023-27954

<0:2.40.5-1.el9
  • H
CVE-2023-38594

<0:2.40.5-1.el9
  • H
Use After Free

<0:2.40.5-1.el9
  • H
CVE-2023-38592

<0:2.40.5-1.el9
  • H
CVE-2023-32370

<0:2.40.5-1.el9
  • H
CVE-2023-38611

<0:2.40.5-1.el9
  • H
CVE-2023-38572

<0:2.40.5-1.el9
  • H
CVE-2023-38597

<0:2.40.5-1.el9
  • H
CVE-2023-38600

<0:2.40.5-1.el9
  • H
CVE-2023-32393

<0:2.40.5-1.el9
  • H
Out-of-bounds Write

<0:2.40.5-1.el9
  • H
CVE-2023-40451

<0:2.40.5-1.el9
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.38.5-1.el9_2.3
  • H
Out-of-bounds Write

<0:2.38.5-1.el9_2.3
  • H
Out-of-bounds Read

<0:2.38.5-1.el9_2.2
  • H
Use After Free

<0:2.38.5-1.el9_2.2
  • H
Use After Free

<0:2.38.5-1.el9_2.1
  • H
CVE-2022-42852

<0:2.38.5-1.el9
  • H
CVE-2023-23518

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • H
Use After Free

<0:2.38.5-1.el9
  • H
CVE-2022-42824

<0:2.38.5-1.el9
  • H
CVE-2023-23517

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • H
Use After Free

<0:2.38.5-1.el9
  • H
Use After Free

<0:2.38.5-1.el9
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.38.5-1.el9
  • H
Use After Free

<0:2.38.5-1.el9
  • H
Improper Restriction of Rendered UI Layers or Frames

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • H
CVE-2022-46698

<0:2.38.5-1.el9
  • H
Use After Free

<0:2.38.5-1.el9
  • H
Use After Free

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • H
Use After Free

<0:2.38.5-1.el9
  • H
CVE-2022-32923

<0:2.38.5-1.el9
  • H
Out-of-bounds Write

<0:2.38.5-1.el9
  • H
CVE-2022-46692

<0:2.38.5-1.el9
  • H
Use After Free

<0:2.36.7-1.el9_1.3
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.36.7-1.el9_1.2
  • H
Access of Resource Using Incompatible Type ('Type Confusion')

<0:2.36.7-1.el9_1.1
  • M
CVE-2022-22662

<0:2.36.7-1.el9
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Out-of-bounds Write

<0:2.36.7-1.el9
  • M
Out-of-bounds Write

<0:2.36.7-1.el9
  • M
Out-of-bounds Write

<0:2.36.7-1.el9
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Out-of-bounds Write

<0:2.36.7-1.el9
  • M
Out-of-bounds Write

<0:2.36.7-1.el9
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Use After Free

<0:2.36.7-1.el9
  • M
Out-of-bounds Write

<0:2.36.7-1.el9_0