it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Alberto Garcia <berto AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5084-1] wpewebkit security update
- Date: Sat, 19 Feb 2022 19:47:05 +0000
- List-archive: https://lists.debian.org/msgid-search/20220219194705.GA10614 AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From: Date:Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=fQO8B9fVqshb3P4ybxRcBxp4tqr/LUcM9jVGJgCvOHU=; b=j7 ePXb/9D4+qXtem++3rG1CCpBvg09v3gR96p8CZBw/83D2Kiq9PbmyM/BTTlGSoankFovR9fMZvEob roC08o101BKJWc1N43yuuOazVVGCZWmOndGLFZhsQVEBHQfoZOI+oSuES1vJqrg9EG2fSchJkFlwP ZHS4jL30I3VQS1GNdNCZxz3VVSV60JnTu7BUxpMet/iu+do3CUQdoZXzHHq4ukZsFlujgI84DJzCN N6q9382UYPnMj25Zm4yRetEsFNXseAWd/qv1uwITvKbnooWSPdQri4Fv5ERp0nEDF6OaQVbUX0KpQ eqL+1mQ4j5+v1tOM2uANhB0JK4ICV+7Q==;
- Old-return-path: <berto AT debian.org>
- Priority: urgent
- Resent-date: Sat, 19 Feb 2022 19:47:24 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <D8n1ORcHmTN.A.RgH.MlUEiB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5084-1 security AT debian.org
https://www.debian.org/security/ Alberto Garcia
February 19, 2022 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : wpewebkit
CVE ID : CVE-2022-22589 CVE-2022-22590 CVE-2022-22592 CVE-2022-22620
The following vulnerabilities have been discovered in the WPE WebKit
web engine:
CVE-2022-22589
Heige and Bo Qu discovered that processing a maliciously crafted
mail message may lead to running arbitrary javascript.
CVE-2022-22590
Toan Pham discovered that processing maliciously crafted web
content may lead to arbitrary code execution.
CVE-2022-22592
Prakash discovered that processing maliciously crafted web content
may prevent Content Security Policy from being enforced.
CVE-2022-22620
An anonymous researcher discovered that processing maliciously
crafted web content may lead to arbitrary code execution. Apple is
aware of a report that this issue may have been actively
exploited.
For the stable distribution (bullseye), these problems have been fixed in
version 2.34.6-1~deb11u1.
We recommend that you upgrade your wpewebkit packages.
For the detailed security status of wpewebkit please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wpewebkit
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----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=HrgW
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 5084-1] wpewebkit security update, Alberto Garcia, 19.02.2022
Archiv bereitgestellt durch MHonArc 2.6.24.