<oval_definitions xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5" xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5" xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5" xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" xmlns:red-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" xmlns:ind-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#independent" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
<generator>
<oval:product_name>Oracle Errata System</oval:product_name>
<oval:product_version>Oracle Linux</oval:product_version>
<oval:schema_version>5.11</oval:schema_version>
<oval:timestamp>2026-04-22T22:15:04</oval:timestamp>
</generator>
<definitions>
<definition id="oval:com.oracle.elsa:def:20269692" version="501" class="patch">
<metadata>
<title>
ELSA-2026-9692:  webkit2gtk3 security update (IMPORTANT)
</title>
<affected family="unix">
<platform>Oracle Linux 9</platform>

</affected>
<reference source="elsa" ref_id="ELSA-2026-9692" ref_url="https://linux.oracle.com/errata/ELSA-2026-9692.html"/>
<reference source="CVE" ref_id="CVE-2025-43213" ref_url="https://linux.oracle.com/cve/CVE-2025-43213.html"/>
<reference source="CVE" ref_id="CVE-2025-43214" ref_url="https://linux.oracle.com/cve/CVE-2025-43214.html"/>
<reference source="CVE" ref_id="CVE-2025-43457" ref_url="https://linux.oracle.com/cve/CVE-2025-43457.html"/>
<reference source="CVE" ref_id="CVE-2025-43511" ref_url="https://linux.oracle.com/cve/CVE-2025-43511.html"/>
<reference source="CVE" ref_id="CVE-2025-46299" ref_url="https://linux.oracle.com/cve/CVE-2025-46299.html"/>
<reference source="CVE" ref_id="CVE-2026-20608" ref_url="https://linux.oracle.com/cve/CVE-2026-20608.html"/>
<reference source="CVE" ref_id="CVE-2026-20635" ref_url="https://linux.oracle.com/cve/CVE-2026-20635.html"/>
<reference source="CVE" ref_id="CVE-2026-20636" ref_url="https://linux.oracle.com/cve/CVE-2026-20636.html"/>
<reference source="CVE" ref_id="CVE-2026-20643" ref_url="https://linux.oracle.com/cve/CVE-2026-20643.html"/>
<reference source="CVE" ref_id="CVE-2026-20644" ref_url="https://linux.oracle.com/cve/CVE-2026-20644.html"/>
<reference source="CVE" ref_id="CVE-2026-20652" ref_url="https://linux.oracle.com/cve/CVE-2026-20652.html"/>
<reference source="CVE" ref_id="CVE-2026-20664" ref_url="https://linux.oracle.com/cve/CVE-2026-20664.html"/>
<reference source="CVE" ref_id="CVE-2026-20665" ref_url="https://linux.oracle.com/cve/CVE-2026-20665.html"/>
<reference source="CVE" ref_id="CVE-2026-20676" ref_url="https://linux.oracle.com/cve/CVE-2026-20676.html"/>
<reference source="CVE" ref_id="CVE-2026-20691" ref_url="https://linux.oracle.com/cve/CVE-2026-20691.html"/>
<reference source="CVE" ref_id="CVE-2026-28857" ref_url="https://linux.oracle.com/cve/CVE-2026-28857.html"/>
<reference source="CVE" ref_id="CVE-2026-28859" ref_url="https://linux.oracle.com/cve/CVE-2026-28859.html"/>
<reference source="CVE" ref_id="CVE-2026-28871" ref_url="https://linux.oracle.com/cve/CVE-2026-28871.html"/>

<description>
[2.52.3-0.1]
- Update to 2.52.1
</description>
<!--
 ~~~~~~~~~~~~~~~~~~~~   advisory details   ~~~~~~~~~~~~~~~~~~~ 
-->
<advisory>
<severity>IMPORTANT</severity>
<rights>Copyright 2026 Oracle, Inc.</rights>
<issued date="2026-04-22"/>
<cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2025-43213.html" public="20250730">CVE-2025-43213</cve>
<cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2025-43214.html" public="20250730">CVE-2025-43214</cve>
<cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2025-43457.html" public="20251104">CVE-2025-43457</cve>
<cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2025-43511.html" public="20251212">CVE-2025-43511</cve>
<cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://linux.oracle.com/cve/CVE-2025-46299.html" public="20260109">CVE-2025-46299</cve>
<cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-20608.html" public="20260211">CVE-2026-20608</cve>
<cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-20635.html" public="20260211">CVE-2026-20635</cve>
<cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-20636.html" public="20260211">CVE-2026-20636</cve>
<cve cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-20643.html" public="20260317">CVE-2026-20643</cve>
<cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-20644.html" public="20260211">CVE-2026-20644</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://linux.oracle.com/cve/CVE-2026-20652.html" public="20260211">CVE-2026-20652</cve>
<cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-20664.html" public="20260325">CVE-2026-20664</cve>
<cve cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://linux.oracle.com/cve/CVE-2026-20665.html" public="20260325">CVE-2026-20665</cve>
<cve cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://linux.oracle.com/cve/CVE-2026-20676.html" public="20260211">CVE-2026-20676</cve>
<cve cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://linux.oracle.com/cve/CVE-2026-20691.html" public="20260325">CVE-2026-20691</cve>
<cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-28857.html" public="20260325">CVE-2026-28857</cve>
<cve cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-28859.html" public="20260325">CVE-2026-28859</cve>
<cve cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://linux.oracle.com/cve/CVE-2026-28871.html" public="20260325">CVE-2026-28871</cve>

<affected_cpe_list>
<cpe>cpe:/a:oracle:linux:9::appstream</cpe>
</affected_cpe_list>
</advisory>
</metadata>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20269692001" comment="Oracle Linux 9 is installed"/>
<criteria operator="OR">
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20269692002" comment="Oracle Linux arch is aarch64"/>
<criteria operator="OR">
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20269692003" comment="webkit2gtk3 is earlier than 0:2.52.3-0.el9_7.1"/>
<criterion test_ref="oval:com.oracle.elsa:tst:20269692004" comment="webkit2gtk3 is signed with the Oracle Linux 9 key"/>
</criteria>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20269692005" comment="webkit2gtk3-devel is earlier than 0:2.52.3-0.el9_7.1"/>
<criterion test_ref="oval:com.oracle.elsa:tst:20269692006" comment="webkit2gtk3-devel is signed with the Oracle Linux 9 key"/>
</criteria>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20269692007" comment="webkit2gtk3-jsc is earlier than 0:2.52.3-0.el9_7.1"/>
<criterion test_ref="oval:com.oracle.elsa:tst:20269692008" comment="webkit2gtk3-jsc is signed with the Oracle Linux 9 key"/>
</criteria>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20269692009" comment="webkit2gtk3-jsc-devel is earlier than 0:2.52.3-0.el9_7.1"/>
<criterion test_ref="oval:com.oracle.elsa:tst:20269692010" comment="webkit2gtk3-jsc-devel is signed with the Oracle Linux 9 key"/>
</criteria>
</criteria>
</criteria>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20269692011" comment="Oracle Linux arch is x86_64"/>
<criteria operator="OR">
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20269692003" comment="webkit2gtk3 is earlier than 0:2.52.3-0.el9_7.1"/>
<criterion test_ref="oval:com.oracle.elsa:tst:20269692004" comment="webkit2gtk3 is signed with the Oracle Linux 9 key"/>
</criteria>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20269692005" comment="webkit2gtk3-devel is earlier than 0:2.52.3-0.el9_7.1"/>
<criterion test_ref="oval:com.oracle.elsa:tst:20269692006" comment="webkit2gtk3-devel is signed with the Oracle Linux 9 key"/>
</criteria>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20269692007" comment="webkit2gtk3-jsc is earlier than 0:2.52.3-0.el9_7.1"/>
<criterion test_ref="oval:com.oracle.elsa:tst:20269692008" comment="webkit2gtk3-jsc is signed with the Oracle Linux 9 key"/>
</criteria>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20269692009" comment="webkit2gtk3-jsc-devel is earlier than 0:2.52.3-0.el9_7.1"/>
<criterion test_ref="oval:com.oracle.elsa:tst:20269692010" comment="webkit2gtk3-jsc-devel is signed with the Oracle Linux 9 key"/>
</criteria>
</criteria>
</criteria>
</criteria>
</criteria>

</definition>
</definitions>
<!--
 ~~~~~~~~~~~~~~~~~~~~~   rpminfo tests   ~~~~~~~~~~~~~~~~~~~~~ 
-->
<tests>
<rpminfo_test id="oval:com.oracle.elsa:tst:20269692001"  version="501" comment="Oracle Linux 9 is installed" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20269692001" />
<state state_ref="oval:com.oracle.elsa:ste:20269692002" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20269692002"  version="501" comment="Oracle Linux arch is aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20269692001" />
<state state_ref="oval:com.oracle.elsa:ste:20269692003" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20269692003"  version="501" comment="webkit2gtk3 is earlier than 0:2.52.3-0.el9_7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20269692002" />
<state state_ref="oval:com.oracle.elsa:ste:20269692004" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20269692004"  version="501" comment="webkit2gtk3 is signed with the Oracle Linux 9 key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20269692002" />
<state state_ref="oval:com.oracle.elsa:ste:20269692001" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20269692005"  version="501" comment="webkit2gtk3-devel is earlier than 0:2.52.3-0.el9_7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20269692003" />
<state state_ref="oval:com.oracle.elsa:ste:20269692004" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20269692006"  version="501" comment="webkit2gtk3-devel is signed with the Oracle Linux 9 key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20269692003" />
<state state_ref="oval:com.oracle.elsa:ste:20269692001" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20269692007"  version="501" comment="webkit2gtk3-jsc is earlier than 0:2.52.3-0.el9_7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20269692004" />
<state state_ref="oval:com.oracle.elsa:ste:20269692004" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20269692008"  version="501" comment="webkit2gtk3-jsc is signed with the Oracle Linux 9 key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20269692004" />
<state state_ref="oval:com.oracle.elsa:ste:20269692001" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20269692009"  version="501" comment="webkit2gtk3-jsc-devel is earlier than 0:2.52.3-0.el9_7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20269692005" />
<state state_ref="oval:com.oracle.elsa:ste:20269692004" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20269692010"  version="501" comment="webkit2gtk3-jsc-devel is signed with the Oracle Linux 9 key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20269692005" />
<state state_ref="oval:com.oracle.elsa:ste:20269692001" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20269692011"  version="501" comment="Oracle Linux arch is x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20269692001" />
<state state_ref="oval:com.oracle.elsa:ste:20269692005" />
</rpminfo_test>

</tests>
<!--
 ~~~~~~~~~~~~~~~~~~~~   rpminfo objects   ~~~~~~~~~~~~~~~~~~~~ 
-->
<objects>
<rpminfo_object xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:obj:20269692002" version="501">
<name>webkit2gtk3</name>
</rpminfo_object>
<rpminfo_object xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:obj:20269692005" version="501">
<name>webkit2gtk3-jsc-devel</name>
</rpminfo_object>
<rpminfo_object xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:obj:20269692003" version="501">
<name>webkit2gtk3-devel</name>
</rpminfo_object>
<rpminfo_object xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:obj:20269692004" version="501">
<name>webkit2gtk3-jsc</name>
</rpminfo_object>
<rpminfo_object xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:obj:20269692001" version="501">
<name>oraclelinux-release</name>
</rpminfo_object>
</objects>
<states>
<!--
 ~~~~~~~~~~~~~~~~~~~~   rpminfo states   ~~~~~~~~~~~~~~~~~~~~~ 
-->
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:20269692001" version="501">
<signature_keyid operation="equals">bc4d06a08d8b756f</signature_keyid>
</rpminfo_state>
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:20269692002" version="501">
<version operation="pattern match">^9</version>
</rpminfo_state>
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:20269692003" version="501">
<arch operation="pattern match">aarch64</arch>
</rpminfo_state>
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:20269692004" version="501">
<evr datatype="evr_string" operation="less than">0:2.52.3-0.el9_7.1</evr>
</rpminfo_state>
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:20269692005" version="501">
<arch operation="pattern match">x86_64</arch>
</rpminfo_state>

</states>
</oval_definitions>
