-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5155-1 [email protected] https://www.debian.org/security/ Alberto Garcia June 01, 2022 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : wpewebkit CVE ID : CVE-2022-26700 CVE-2022-26709 CVE-2022-26716 CVE-2022-26717 CVE-2022-26719 CVE-2022-30293 CVE-2022-30294 The following vulnerabilities have been discovered in the WPE WebKit web engine: CVE-2022-26700 ryuzaki discovered that processing maliciously crafted web content may lead to code execution. CVE-2022-26709 Chijin Zhou discovered that processing maliciously crafted web content may lead to arbitrary code execution. CVE-2022-26716 SorryMybad discovered that Processing maliciously crafted web content may lead to arbitrary code execution. CVE-2022-26717 Jeonghoon Shin discovered that Processing maliciously crafted web content may lead to arbitrary code execution. CVE-2022-26719 Dongzhuo Zhao discovered that Processing maliciously crafted web content may lead to arbitrary code execution. CVE-2022-30293 Chijin Zhou discovered that processing maliciously crafted web content may lead to arbitrary code execution or to a denial of service (application crash). CVE-2022-30294 Chijin Zhou discovered that processing maliciously crafted web content may lead to arbitrary code execution or to a denial of service (application crash). For the stable distribution (bullseye), these problems have been fixed in version 2.36.3-1~deb11u1. We recommend that you upgrade your wpewebkit packages. For the detailed security status of wpewebkit please refer to its security tracker page at: https://security-tracker.debian.org/tracker/wpewebkit Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: [email protected]