Debian: DSA-4945-1: webkit2gtk security update
Summary
The following vulnerabilities have been discovered in the webkit2gtk
web engine:
CVE-2021-21775
Marcin Towalski discovered that a specially crafted web page can
lead to a potential information leak and further memory
corruption. In order to trigger the vulnerability, a victim must
be tricked into visiting a malicious webpage.
CVE-2021-21779
Marcin Towalski discovered that a specially crafted web page can
lead to a potential information leak and further memory
corruption. In order to trigger the vulnerability, a victim must
be tricked into visiting a malicious webpage.
CVE-2021-30663
An anonymous researcher discovered that processing maliciously
crafted web content may lead to arbitrary code execution.
CVE-2021-30665
yangkang discovered that processing maliciously crafted web
content may lead to arbitrary code execution. Apple is aware of a
report that this issue may have been actively exploited.
CVE-2021-30689
An anonymous researcher discovered that processing maliciously
crafted web content may lead to universal cross site scripting.
CVE-2021-30720
David Schutz discovered that a malicious website may be able to
access restricted ports on arbitrary servers.
CVE-2021-30734
Jack Dates discovered that processing maliciously crafted web
content may lead to arbitrary code execution.
CVE-2021-30744
Dan Hite discovered that processing maliciously crafted web
content may lead to universal cross site scripting.
CVE-2021-30749
An anonymous researcher discovered that processing maliciously
crafted web content may lead to arbitrary code execution.
CVE-2021-30758
Christoph Guttandin discovered that processing maliciously crafted
web content may lead to arbitrary code execution.
CVE-2021-30795
Sergei Glazunov discovered that processing maliciously crafted web
content may lead to arbitrary code execution.
CVE-2021-30797
Ivan Fratric discovered that processing maliciously crafted web
content may lead to code execution.
CVE-2021-30799
Sergei Glazunov discovered that processing maliciously crafted web
content may lead to arbitrary code execution.
For the stable distribution (buster), these problems have been fixed in
version 2.32.3-1~deb10u1.
We recommend that you upgrade your webkit2gtk packages.
For the detailed security status of webkit2gtk please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/webkit2gtk
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org