• [SECURITY] [DSA 5274-1] wpewebkit security update

    From Alberto Garcia@21:1/5 to All on Tue Nov 8 19:10:01 2022
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA256

    - ------------------------------------------------------------------------- Debian Security Advisory DSA-5274-1 security@debian.org https://www.debian.org/security/ Alberto Garcia November 08, 2022 https://www.debian.org/security/faq
    - -------------------------------------------------------------------------

    Package : wpewebkit
    CVE ID : CVE-2022-42799 CVE-2022-42823 CVE-2022-42824

    The following vulnerabilities have been discovered in the WPE WebKit
    web engine:

    CVE-2022-42799

    Jihwan Kim and Dohyun Lee discovered that visiting a malicious
    website may lead to user interface spoofing.

    CVE-2022-42823

    Dohyun Lee discovered that processing maliciously crafted web
    content may lead to arbitrary code execution.

    CVE-2022-42824

    Abdulrahman Alqabandi, Ryan Shin and Dohyun Lee discovered that
    processing maliciously crafted web content may disclose sensitive
    user information.

    For the stable distribution (bullseye), these problems have been fixed in version 2.38.2-1~deb11u1.

    We recommend that you upgrade your wpewebkit packages.

    For the detailed security status of wpewebkit please refer to
    its security tracker page at: https://security-tracker.debian.org/tracker/wpewebkit

    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/

    Mailing list: debian-security-announce@lists.debian.org
    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCAAdFiEEYrwugQBKzlHMYFizAAyEYu0C2AIFAmNqlrkACgkQAAyEYu0C 2AIikQ//RJodZeKMtDMpFvHbXIJcwGT7TpZhaLyvBHpcjinZgIvOB0C4EMPTZOJw QAetrGXevjWIanjoySUrsoFA8BYT1fwjOLXVaOAyHAgR6TxJAMIYnk4qDbzsDvjy Hh5kL1hoSs1VRSXzMVVo7jxkpwrddQRCVkkNZfqQw6UyymSNknQ/LYA2qd70WLyE JOD3GHyG2TF9lxXo7L6mlNeyYxRIhh+9kUtdgACtNYhVmnSORIx0q5LJclPRbBMl L/OcY3SxRpzW4UlvYJOeU968T7Xyn1ZEEbBsUV51ep9BETlEQZmRkU9P4fulOif4 yvhzF1fkXAhsOcdCOQ4HAY0Pc3p+VzQHof9YuTsj0L9OTKT7FvYeHNYkJNA5GXiB A8Mp+9OxP0poCrt4U+ZlWlf2N3NdzseD0XQsRFqao8GoRZHE1W5l+WPSpSFHALUU bSW9WqfMDo0YEpYwk3PIgBd0Ycx/mOs3AogrA9+SSbdlu0dEzlsF5IIYtOM3nZcZ aa5O12eZ9rnFB/c/RsUw8i+2z2Bp18OWBaXjMpiCXUicPm/6dI0D2D66d1T15Utq EUkNBS6ExF9Z3GG93/M6mKCM/ATZ/LraN21pvHHl6dfFsuwfJUSQc7/llPpB5Y0j UR4Bvmem8O8dmbXpfxRXOwWFr5NiUYalXW1qEgf3Is1jICC85sw=
    =gSzC
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)