-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
- ------------------------------------------------------------------------- Debian Security Advisory DSA-5083-1
security@debian.org https://www.debian.org/security/ Alberto Garcia February 19, 2022
https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : webkit2gtk
CVE ID : CVE-2022-22589 CVE-2022-22590 CVE-2022-22592 CVE-2022-22620
The following vulnerabilities have been discovered in the WebKitGTK
web engine:
CVE-2022-22589
Heige and Bo Qu discovered that processing a maliciously crafted
mail message may lead to running arbitrary javascript.
CVE-2022-22590
Toan Pham discovered that processing maliciously crafted web
content may lead to arbitrary code execution.
CVE-2022-22592
Prakash discovered that processing maliciously crafted web content
may prevent Content Security Policy from being enforced.
CVE-2022-22620
An anonymous researcher discovered that processing maliciously
crafted web content may lead to arbitrary code execution. Apple is
aware of a report that this issue may have been actively
exploited.
For the oldstable distribution (buster), these problems have been fixed
in version 2.34.6-1~deb10u1.
For the stable distribution (bullseye), these problems have been fixed in version 2.34.6-1~deb11u1.
We recommend that you upgrade your webkit2gtk packages.
For the detailed security status of webkit2gtk please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/webkit2gtk
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at:
https://www.debian.org/security/
Mailing list:
debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEEYrwugQBKzlHMYFizAAyEYu0C2AIFAmIRR1wACgkQAAyEYu0C 2AIcYw//V9jukvx6q3lqOxHHo5edD8+5XXFLkxtxdTQzwKSLy/jXnh5ym4EKdWPY RpaI5pHCzHwGJSMEGpCAxkSNvRG0JKrMeo5mTt54Rn1ansfrSAXXaejnnX+/LaNe 1py8UYh8VpcHrfrtBJgAH3DpdSfDRQuSA5NBZXyhGfrhHDqpuI2izTPpNAJUU3aU 6s2m2IgwIYQfSbzXjmMMlNjl1YSV3iBfHkvT/yGfQPRVKy4ITaBtbxJPfW8SextF kM4FcJ0h+ibq2RgLasvG/SUWAYnMrsnq6ZdFs1JQNXsIsevRRQy9PAq3Yh9oav26 Dyn+Nb1nlmrbhGGV20SpkXmOTQ6pxG7g8B8KyKwyE+pfmm+FRG99Zr896pm2IxI4 /2QUWGBvN3+yVm3gV18aiB6c9EJrFRiRBgF4IgIU71UoKg1a+pVkdcL/FK6xbiob QOKTbjWmOlC91suAW4nU+XGX5iPGtdPyIhjmudltfoD6/lQpQ5fvzEK2izUg0lc3 frJRNeH00kTJP/b/97zf6KQSOIlqs59tDl6cC0hBo7KVle/E26XCJzLnj4BuG2de UhHxbCd5Cwud2F8Vntbmm4/HA1TRJWAL1xFDG9gWoHtSu14rVsZ309kLrIkI6fPB h7g7LfegJMz6xB3L8fIiESoybZM8RCKwK6L+yZyMAVuq6PqKTjs=
=uey+
-----END PGP SIGNATURE-----
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)