Exploit/Advisories no image

Published on January 2nd, 2023 📆 | 5821 Views ⚑

0

Debian Security Advisory 5309-1 – Torchsec


iSpeech.org

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5309-1 security@debian.org
https://www.debian.org/security/ Alberto Garcia
December 31, 2022 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : wpewebkit
CVE ID : CVE-2022-42852 CVE-2022-42856 CVE-2022-42867 CVE-2022-46692
CVE-2022-46698 CVE-2022-46699 CVE-2022-46700

The following vulnerabilities have been discovered in the WPE WebKit
web engine:

CVE-2022-42852

hazbinhotel discovered that processing maliciously crafted web
content may result in the disclosure of process memory.

CVE-2022-42856

Clement Lecigne discovered that processing maliciously crafted web
content may lead to arbitrary code execution.

CVE-2022-42867

Maddie Stone discovered that processing maliciously crafted web
content may lead to arbitrary code execution.

CVE-2022-46692

KirtiKumar Anandrao Ramchandani discovered that processing
maliciously crafted web content may bypass Same Origin Policy.

CVE-2022-46698





Dohyun Lee and Ryan Shin discovered that processing maliciously
crafted web content may disclose sensitive user information.

CVE-2022-46699

Samuel Gross discovered that processing maliciously crafted web
content may lead to arbitrary code execution.

CVE-2022-46700

Samuel Gross discovered that processing maliciously crafted web
content may lead to arbitrary code execution.

For the stable distribution (bullseye), these problems have been fixed in
version 2.38.3-1~deb11u1.

We recommend that you upgrade your wpewebkit packages.

For the detailed security status of wpewebkit please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wpewebkit

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEEYrwugQBKzlHMYFizAAyEYu0C2AIFAmOvgR0ACgkQAAyEYu0C
2AJ1whAAlHxhqKrBKVR6sCPX5DFL7UGiVkIX85tUdD4ABpECeSRWFnwgx7im1g0d
JP8f/b4x9hmRZpTHnD/UCuUtPaVrLQbkhyCXnk71oe1EzQGtiFSNGpeFX8JEH/w+
h+3ITIg+ccJM5uHNpC0METgWMDOUTQpfDMq0BPsWkqcRrFa0lt10Geb0o+dYAzQ9
YKuULrcNl/aelSzowPIV9AUqHJvwTfh0EQOf99JVJlVcXXVls7NbjjZHhGoLNCHd
cRLjkB/iUFWVUqq42O4PRj3v7Lb9CWBM0OUFNUpjWdGVaXQD6kBDkGfz+4afnU1Q
+vqg8cU7a3mFhZ5c8mn1zeynR+/5D+IfZTbMFfLQoe8T5cEOjUCFOAMgM0VC+sDs
1bI5RQDeFF4LzXROcDeW5QCsvefeqhIfkRc9pcJcktM1jDLCTFSRp6/ReQ6QfrZB
Vs3x2PBEoECknq9xUaL9USQEoy7EXpEXcIdWo/CuSgNpotKu2pkorFXAogYfTYpT
YqCwVnviQqKExE6r7mE7ixPY2YEzmsBxVIT7amv4VCbf1NuU2WfWdpLOQ/9liits
hN9xNJCzo/ZWj9/j9Gm0YHKhABBjfbUrzSD52HxqpPQaij3ZxEERh2XDogyCKg+6
D7ZFmgvzL9dS1Uq0wOuys0tDRrbAQg76TrrYHj0DdMswURuOUgY=equ6
-----END PGP SIGNATURE-----

Source link

Tagged with:



Comments are closed.