DSA-4627-1 webkit2gtk -- security update

Related Vulnerabilities: CVE-2020-3862   CVE-2020-3864   CVE-2020-3865   CVE-2020-3867   CVE-2020-3868  

The following vulnerabilities have been discovered in the webkit2gtk web engine: CVE-2020-3862 Srikanth Gatta discovered that a malicious website may be able to cause a denial of service. CVE-2020-3864 Ryan Pickren discovered that a DOM object context may not have had a unique security origin. CVE-2020-3865 Ryan Pickren discovered that a top-level DOM object context may have incorrectly been considered secure. CVE-2020-3867 An anonymous researcher discovered that processing maliciously crafted web content may lead to universal cross site scripting. CVE-2020-3868 Marcin Towalski discovered that processing maliciously crafted web content may lead to arbitrary code execution. For the stable distribution (buster), these problems have been fixed in version 2.26.4-1~deb10u1. We recommend that you upgrade your webkit2gtk packages. For the detailed security status of webkit2gtk please refer to its security tracker page at: https://security-tracker.debian.org/tracker/webkit2gtk

Debian Security Advisory

DSA-4627-1 webkit2gtk -- security update

Date Reported:
17 Feb 2020
Affected Packages:
webkit2gtk
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2020-3862, CVE-2020-3864, CVE-2020-3865, CVE-2020-3867, CVE-2020-3868.
More information:

The following vulnerabilities have been discovered in the webkit2gtk web engine:

  • CVE-2020-3862

    Srikanth Gatta discovered that a malicious website may be able to cause a denial of service.

  • CVE-2020-3864

    Ryan Pickren discovered that a DOM object context may not have had a unique security origin.

  • CVE-2020-3865

    Ryan Pickren discovered that a top-level DOM object context may have incorrectly been considered secure.

  • CVE-2020-3867

    An anonymous researcher discovered that processing maliciously crafted web content may lead to universal cross site scripting.

  • CVE-2020-3868

    Marcin Towalski discovered that processing maliciously crafted web content may lead to arbitrary code execution.

For the stable distribution (buster), these problems have been fixed in version 2.26.4-1~deb10u1.

We recommend that you upgrade your webkit2gtk packages.

For the detailed security status of webkit2gtk please refer to its security tracker page at: https://security-tracker.debian.org/tracker/webkit2gtk