DSA-5083-1 webkit2gtk -- security update

Related Vulnerabilities: CVE-2022-22589   CVE-2022-22590   CVE-2022-22592   CVE-2022-22620  

The following vulnerabilities have been discovered in the WebKitGTK web engine: CVE-2022-22589 Heige and Bo Qu discovered that processing a maliciously crafted mail message may lead to running arbitrary javascript. CVE-2022-22590 Toan Pham discovered that processing maliciously crafted web content may lead to arbitrary code execution. CVE-2022-22592 Prakash discovered that processing maliciously crafted web content may prevent Content Security Policy from being enforced. CVE-2022-22620 An anonymous researcher discovered that processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. For the oldstable distribution (buster), these problems have been fixed in version 2.34.6-1~deb10u1. For the stable distribution (bullseye), these problems have been fixed in version 2.34.6-1~deb11u1. We recommend that you upgrade your webkit2gtk packages. For the detailed security status of webkit2gtk please refer to its security tracker page at: https://security-tracker.debian.org/tracker/webkit2gtk

Debian Security Advisory

DSA-5083-1 webkit2gtk -- security update

Date Reported:
19 Feb 2022
Affected Packages:
webkit2gtk
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2022-22589, CVE-2022-22590, CVE-2022-22592, CVE-2022-22620.
More information:

The following vulnerabilities have been discovered in the WebKitGTK web engine:

  • CVE-2022-22589

    Heige and Bo Qu discovered that processing a maliciously crafted mail message may lead to running arbitrary javascript.

  • CVE-2022-22590

    Toan Pham discovered that processing maliciously crafted web content may lead to arbitrary code execution.

  • CVE-2022-22592

    Prakash discovered that processing maliciously crafted web content may prevent Content Security Policy from being enforced.

  • CVE-2022-22620

    An anonymous researcher discovered that processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.

For the oldstable distribution (buster), these problems have been fixed in version 2.34.6-1~deb10u1.

For the stable distribution (bullseye), these problems have been fixed in version 2.34.6-1~deb11u1.

We recommend that you upgrade your webkit2gtk packages.

For the detailed security status of webkit2gtk please refer to its security tracker page at: https://security-tracker.debian.org/tracker/webkit2gtk