[SECURITY] [DSA 5083-1] webkit2gtk security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5083-1 security@debian.org
https://www.debian.org/security/ Alberto Garcia
February 19, 2022 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : webkit2gtk
CVE ID : CVE-2022-22589 CVE-2022-22590 CVE-2022-22592 CVE-2022-22620
The following vulnerabilities have been discovered in the WebKitGTK
web engine:
CVE-2022-22589
Heige and Bo Qu discovered that processing a maliciously crafted
mail message may lead to running arbitrary javascript.
CVE-2022-22590
Toan Pham discovered that processing maliciously crafted web
content may lead to arbitrary code execution.
CVE-2022-22592
Prakash discovered that processing maliciously crafted web content
may prevent Content Security Policy from being enforced.
CVE-2022-22620
An anonymous researcher discovered that processing maliciously
crafted web content may lead to arbitrary code execution. Apple is
aware of a report that this issue may have been actively
exploited.
For the oldstable distribution (buster), these problems have been fixed
in version 2.34.6-1~deb10u1.
For the stable distribution (bullseye), these problems have been fixed in
version 2.34.6-1~deb11u1.
We recommend that you upgrade your webkit2gtk packages.
For the detailed security status of webkit2gtk please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/webkit2gtk
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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=uey+
-----END PGP SIGNATURE-----
Reply to: