The following vulnerabilities have been discovered in the webkit2gtk web engine: CVE-2021-30846 Sergei Glazunov discovered that processing maliciously crafted web content may lead to arbitrary code execution CVE-2021-30851 Samuel Gross discovered that processing maliciously crafted web content may lead to code execution CVE-2021-42762 An anonymous reporter discovered a limited Bubblewrap sandbox bypass that allows a sandboxed process to trick host processes into thinking the sandboxed process is not confined. For the oldstable distribution (buster), these problems have been fixed in version 2.34.1-1~deb10u1. For the stable distribution (bullseye), these problems have been fixed in version 2.34.1-1~deb11u1. We recommend that you upgrade your webkit2gtk packages. For the detailed security status of webkit2gtk please refer to its security tracker page at: https://security-tracker.debian.org/tracker/webkit2gtk
The following vulnerabilities have been discovered in the webkit2gtk web engine:
Sergei Glazunov discovered that processing maliciously crafted web content may lead to arbitrary code execution
Samuel Gross discovered that processing maliciously crafted web content may lead to code execution
An anonymous reporter discovered a limited Bubblewrap sandbox bypass that allows a sandboxed process to trick host processes into thinking the sandboxed process is not confined.
For the oldstable distribution (buster), these problems have been fixed in version 2.34.1-1~deb10u1.
For the stable distribution (bullseye), these problems have been fixed in version 2.34.1-1~deb11u1.
We recommend that you upgrade your webkit2gtk packages.
For the detailed security status of webkit2gtk please refer to its security tracker page at: https://security-tracker.debian.org/tracker/webkit2gtk