-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5083-1 security@debian.org https://www.debian.org/security/ Alberto Garcia February 19, 2022 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : webkit2gtk CVE ID : CVE-2022-22589 CVE-2022-22590 CVE-2022-22592 CVE-2022-22620 The following vulnerabilities have been discovered in the WebKitGTK web engine: CVE-2022-22589 Heige and Bo Qu discovered that processing a maliciously crafted mail message may lead to running arbitrary javascript. CVE-2022-22590 Toan Pham discovered that processing maliciously crafted web content may lead to arbitrary code execution. CVE-2022-22592 Prakash discovered that processing maliciously crafted web content may prevent Content Security Policy from being enforced. CVE-2022-22620 An anonymous researcher discovered that processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. For the oldstable distribution (buster), these problems have been fixed in version 2.34.6-1~deb10u1. For the stable distribution (bullseye), these problems have been fixed in version 2.34.6-1~deb11u1. We recommend that you upgrade your webkit2gtk packages. For the detailed security status of webkit2gtk please refer to its security tracker page at: https://security-tracker.debian.org/tracker/webkit2gtk Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEYrwugQBKzlHMYFizAAyEYu0C2AIFAmIRR1wACgkQAAyEYu0C 2AIcYw//V9jukvx6q3lqOxHHo5edD8+5XXFLkxtxdTQzwKSLy/jXnh5ym4EKdWPY RpaI5pHCzHwGJSMEGpCAxkSNvRG0JKrMeo5mTt54Rn1ansfrSAXXaejnnX+/LaNe 1py8UYh8VpcHrfrtBJgAH3DpdSfDRQuSA5NBZXyhGfrhHDqpuI2izTPpNAJUU3aU 6s2m2IgwIYQfSbzXjmMMlNjl1YSV3iBfHkvT/yGfQPRVKy4ITaBtbxJPfW8SextF kM4FcJ0h+ibq2RgLasvG/SUWAYnMrsnq6ZdFs1JQNXsIsevRRQy9PAq3Yh9oav26 Dyn+Nb1nlmrbhGGV20SpkXmOTQ6pxG7g8B8KyKwyE+pfmm+FRG99Zr896pm2IxI4 /2QUWGBvN3+yVm3gV18aiB6c9EJrFRiRBgF4IgIU71UoKg1a+pVkdcL/FK6xbiob QOKTbjWmOlC91suAW4nU+XGX5iPGtdPyIhjmudltfoD6/lQpQ5fvzEK2izUg0lc3 frJRNeH00kTJP/b/97zf6KQSOIlqs59tDl6cC0hBo7KVle/E26XCJzLnj4BuG2de UhHxbCd5Cwud2F8Vntbmm4/HA1TRJWAL1xFDG9gWoHtSu14rVsZ309kLrIkI6fPB h7g7LfegJMz6xB3L8fIiESoybZM8RCKwK6L+yZyMAVuq6PqKTjs= =uey+ -----END PGP SIGNATURE-----