The following vulnerabilities have been discovered in the webkit2gtk web engine: CVE-2021-30934 Dani Biro discovered that processing maliciously crafted web content may lead to arbitrary code execution. CVE-2021-30936 Chijin Zhou discovered that processing maliciously crafted web content may lead to arbitrary code execution. CVE-2021-30951 Pangu discovered that processing maliciously crafted web content may lead to arbitrary code execution. CVE-2021-30952 WeBin discovered that processing maliciously crafted web content may lead to arbitrary code execution. CVE-2021-30953 VRIJ discovered that processing maliciously crafted web content may lead to arbitrary code execution. CVE-2021-30954 Kunlun Lab discovered that processing maliciously crafted web content may lead to arbitrary code execution. CVE-2021-30984 Kunlun Lab discovered that processing maliciously crafted web content may lead to arbitrary code execution. For the oldstable distribution (buster), these problems have been fixed in version 2.34.4-1~deb10u1. For the stable distribution (bullseye), these problems have been fixed in version 2.34.4-1~deb11u1. We recommend that you upgrade your webkit2gtk packages. For the detailed security status of webkit2gtk please refer to its security tracker page at: https://security-tracker.debian.org/tracker/webkit2gtk
The following vulnerabilities have been discovered in the webkit2gtk web engine:
Dani Biro discovered that processing maliciously crafted web content may lead to arbitrary code execution.
Chijin Zhou discovered that processing maliciously crafted web content may lead to arbitrary code execution.
Pangu discovered that processing maliciously crafted web content may lead to arbitrary code execution.
WeBin discovered that processing maliciously crafted web content may lead to arbitrary code execution.
VRIJ discovered that processing maliciously crafted web content may lead to arbitrary code execution.
Kunlun Lab discovered that processing maliciously crafted web content may lead to arbitrary code execution.
Kunlun Lab discovered that processing maliciously crafted web content may lead to arbitrary code execution.
For the oldstable distribution (buster), these problems have been fixed in version 2.34.4-1~deb10u1.
For the stable distribution (bullseye), these problems have been fixed in version 2.34.4-1~deb11u1.
We recommend that you upgrade your webkit2gtk packages.
For the detailed security status of webkit2gtk please refer to its security tracker page at: https://security-tracker.debian.org/tracker/webkit2gtk