Debian: DSA-2188-1: webkit security update

    Date10 Mar 2011
    CategoryDebian
    81
    Posted ByLinuxSecurity Advisories
    Several vulnerabilities have been discovered in webkit, a Web content engine library for Gtk+. The Common Vulnerabilities and Exposures project identifies the following problems:
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-2188-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                         Giuseppe Iuculano
    March 10, 2011                         http://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : webkit
    Vulnerability  : several
    Problem type   : remote
    Debian-specific: no
    CVE ID         : CVE-2010-1783 CVE-2010-2901 CVE-2010-4199 CVE-2010-4040 CVE-2010-4492 CVE-2010-4493 CVE-2010-4577 CVE-2010-4578 CVE-2010-0474 CVE-2011-0482 CVE-2011-0778
    
    Several vulnerabilities have been discovered in webkit, a Web content engine
    library for Gtk+. The Common Vulnerabilities and Exposures project identifies
    the following problems:
    
    CVE-2010-1783
    
      WebKit does not properly handle dynamic modification of a
      text node, which allows remote attackers to execute arbitrary code or cause
      a denial of service (memory corruption and application crash) via a
      crafted HTML document.
    
    
    CVE-2010-2901
    
      The rendering implementation in WebKit allows
      remote attackers to cause a denial of service (memory corruption) or possibly
      have unspecified other impact via unknown vectors.
    
    
    CVE-2010-4199
    
      WebKit does not properly perform a cast of an
      unspecified variable during processing of an SVG use element, which allows
      remote attackers to cause a denial of service or possibly have unspecified
      other impact via a crafted SVG document.
    
    
    CVE-2010-4040
    
      WebKit does not properly handle animated GIF images,
      which allows remote attackers to cause a denial of service (memory corruption)
      or possibly have unspecified other impact via a crafted image.
    
    
    CVE-2010-4492
    
      Use-after-free vulnerability in WebKit allows
      remote attackers to cause a denial of service or possibly have
      unspecified other impact via vectors involving SVG animations.
    
    
    CVE-2010-4493
    
      Use-after-free vulnerability in Webkit allows remote attackers to cause a
      denial of service via vectors related to the handling of mouse dragging events
    
    
    CVE-2010-4577
    
      The CSSParser::parseFontFaceSrc function in WebCore/css/CSSParser.cpp in
      WebKit does not properly parse Cascading Style Sheets (CSS) token sequences,
      which allows remote attackers to cause a denial of service
      (out-of-bounds read) via a crafted local font, related to "Type Confusion."
    
    
    CVE-2010-4578
    
      WebKit does not properly perform cursor handling, which allows remote
      attackers to cause a denial of service or possibly have unspecified other
      impact via unknown vectors that lead to "stale pointers."
    
    
    CVE-2011-0482
    
      WebKit does not properly perform a cast of an unspecified variable during
      handling of anchors, which allows remote attackers to cause a denial of
      service or possibly have unspecified other impact via a crafted HTML document
    
    
    CVE-2011-0778
    
      WebKit does not properly restrict drag and drop operations, which might allow
      remote attackers to bypass the Same Origin Policy via unspecified vectors.
    
    
    
    For the stable distribution (squeeze), these problems have been fixed
    in version 1.2.7-0+squeeze1
    
    For the testing distribution (wheezy), and the unstable distribution (sid),
    these problems have been fixed in version 1.2.7-1
    
    
    Security support for WebKit has been discontinued for the oldstable
    distribution (lenny).
    The current version in oldstable is not supported by upstream anymore
    and is affected by several security issues. Backporting fixes for these
    and any future issues has become unfeasible and therefore we need to
    drop our security support for the version in oldstable.
    
    We recommend that you upgrade your webkit packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: http://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"5","type":"x","order":"1","pct":55.56,"resources":[]},{"id":"88","title":"Should be more technical","votes":"3","type":"x","order":"2","pct":33.33,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"1","type":"x","order":"3","pct":11.11,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.