[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DSA 5116-1] wpewebkit security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5116-1                   security@debian.org
https://www.debian.org/security/                           Alberto Garcia
April 08, 2022                        https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : wpewebkit
CVE ID         : CVE-2022-22624 CVE-2022-22628 CVE-2022-22629

The following vulnerabilities have been discovered in the WPE WebKit
web engine:

CVE-2022-22624

    Kirin discovered that processing maliciously crafted web content
    may lead to arbitrary code execution.

CVE-2022-22628

    Kirin discovered that Processing maliciously crafted web content
    may lead to arbitrary code execution.

CVE-2022-22629

    Jeonghoon Shin discovered that processing maliciously crafted web
    content may lead to arbitrary code execution.

For the stable distribution (bullseye), these problems have been fixed in
version 2.36.0-2~deb11u1.

We recommend that you upgrade your wpewebkit packages.

For the detailed security status of wpewebkit please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wpewebkit

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=RWku
-----END PGP SIGNATURE-----


Reply to: