Lucene search

K
debianDebianDEBIAN:DSA-5341-1:226E8
HistoryFeb 06, 2023 - 6:20 p.m.

[SECURITY] [DSA 5341-1] wpewebkit security update

2023-02-0618:20:32
lists.debian.org
5

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.004 Low

EPSS

Percentile

74.5%


Debian Security Advisory DSA-5341-1 [email protected]
https://www.debian.org/security/ Alberto Garcia
February 06, 2023 https://www.debian.org/security/faq


Package : wpewebkit
CVE ID : CVE-2022-42826 CVE-2023-23517 CVE-2023-23518

The following vulnerabilities have been discovered in the WebKitGTK
web engine:

CVE-2022-42826

Francisco Alonso discovered that processing maliciously crafted
web content may lead to arbitrary code execution.

CVE-2023-23517

YeongHyeon Choi, Hyeon Park, SeOk JEON, YoungSung Ahn, JunSeo Bae
and Dohyun Lee discovered that processing maliciously crafted web
content may lead to arbitrary code execution.

CVE-2023-23518

YeongHyeon Choi, Hyeon Park, SeOk JEON, YoungSung Ahn, JunSeo Bae
and Dohyun Lee discovered that processing maliciously crafted web
content may lead to arbitrary code execution.

For the stable distribution (bullseye), these problems have been fixed in
version 2.38.4-1~deb11u1.

We recommend that you upgrade your wpewebkit packages.

For the detailed security status of wpewebkit please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wpewebkit

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.004 Low

EPSS

Percentile

74.5%