-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5084-1 security@debian.org https://www.debian.org/security/ Alberto Garcia February 19, 2022 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : wpewebkit CVE ID : CVE-2022-22589 CVE-2022-22590 CVE-2022-22592 CVE-2022-22620 The following vulnerabilities have been discovered in the WPE WebKit web engine: CVE-2022-22589 Heige and Bo Qu discovered that processing a maliciously crafted mail message may lead to running arbitrary javascript. CVE-2022-22590 Toan Pham discovered that processing maliciously crafted web content may lead to arbitrary code execution. CVE-2022-22592 Prakash discovered that processing maliciously crafted web content may prevent Content Security Policy from being enforced. CVE-2022-22620 An anonymous researcher discovered that processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. For the stable distribution (bullseye), these problems have been fixed in version 2.34.6-1~deb11u1. We recommend that you upgrade your wpewebkit packages. For the detailed security status of wpewebkit please refer to its security tracker page at: https://security-tracker.debian.org/tracker/wpewebkit Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEYrwugQBKzlHMYFizAAyEYu0C2AIFAmIRR2oACgkQAAyEYu0C 2AJD0A//X9pA8jdt4jeXzLXiUjIBFip9AHLUlxGRLs3EuqN4yAXhOPG73Ud+mB8o Dw6kD95IsvPFbaTaOpqtsLuSFUySxYrATRp8g8TPRjZef+sm7awm5+pG4dE15F4o rT0O+5+ZBb2QSJVnMzrTm2CMRplfbZ5jYt4rawhxGEbWKcew58Mhe8WpgWlrIvqB U7YczSpisaeIKK2ZH6IDdxPRwdmHrHr6JZzrv9Q9dwZGjOAs8z5+hyWLOoy+bzd3 omfjkIvhLpNufV+JJZaWD9jgPswufw9k2jldF22Xj48jlmQUv9i8nufxI7tDeicw 0QSSD0UEHEFiH9UlAtBtVmYuzd13T4XsYGmgu+U+KHgAhRO3/dvuD4PYObaBMcRY Dj2EvWK7h3WDuAqQeYkK1DC9OGOSTdrgx6RV/jXpa1Ksgoidl2g1MJeV7c6GjZRk ZvuC+iFka7jszdWr3vWlx9FbYQmxDVPMoYF2uAujSX2LYjDJTFxkpm6bv2Nn667E +SjBdCvjNF+VcVNqtovzP9KMBCsz+oIQ4L4/yHootaH8LCtJC2WJaMcNhc7Bv1Y4 PrN4b++0sEiFxzAAk3psw0uJLwrY8/sjawDZPfW30CRJhZtDyI/vQb8VM+4TNT6w V4guL5qFyuxLpZz6zYXlhswpmRJ4HUuflyqLUfG3zqYHYz/Xk3E= =HrgW -----END PGP SIGNATURE-----