[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DSA 5030-1] webkit2gtk security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5030-1                   security@debian.org
https://www.debian.org/security/                           Alberto Garcia
December 23, 2021                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : webkit2gtk
CVE ID         : CVE-2021-30887 CVE-2021-30890

The following vulnerabilities have been discovered in the webkit2gtk
web engine:

CVE-2021-30887

    Narendra Bhati discovered that processing maliciously crafted web
    content may lead to unexpectedly unenforced Content Security
    Policy.

CVE-2021-30890

    An anonymous researcher discovered that processing maliciously
    crafted web content may lead to universal cross site scripting.

For the oldstable distribution (buster), these problems have been fixed
in version 2.34.3-1~deb10u1.

For the stable distribution (bullseye), these problems have been fixed in
version 2.34.3-1~deb11u1.

We recommend that you upgrade your webkit2gtk packages.

For the detailed security status of webkit2gtk please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/webkit2gtk

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=Yc/m
-----END PGP SIGNATURE-----


Reply to: