logo
DATABASE RESOURCES PRICING ABOUT US

webkit2gtk - security update

Description

The following vulnerabilities have been discovered in the webkit2gtk web engine: * [CVE-2021-21775](https://security-tracker.debian.org/tracker/CVE-2021-21775) Marcin Towalski discovered that a specially crafted web page can lead to a potential information leak and further memory corruption. In order to trigger the vulnerability, a victim must be tricked into visiting a malicious webpage. * [CVE-2021-21779](https://security-tracker.debian.org/tracker/CVE-2021-21779) Marcin Towalski discovered that a specially crafted web page can lead to a potential information leak and further memory corruption. In order to trigger the vulnerability, a victim must be tricked into visiting a malicious webpage. * [CVE-2021-30663](https://security-tracker.debian.org/tracker/CVE-2021-30663) An anonymous researcher discovered that processing maliciously crafted web content may lead to arbitrary code execution. * [CVE-2021-30665](https://security-tracker.debian.org/tracker/CVE-2021-30665) yangkang discovered that processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. * [CVE-2021-30689](https://security-tracker.debian.org/tracker/CVE-2021-30689) An anonymous researcher discovered that processing maliciously crafted web content may lead to universal cross site scripting. * [CVE-2021-30720](https://security-tracker.debian.org/tracker/CVE-2021-30720) David Schutz discovered that a malicious website may be able to access restricted ports on arbitrary servers. * [CVE-2021-30734](https://security-tracker.debian.org/tracker/CVE-2021-30734) Jack Dates discovered that processing maliciously crafted web content may lead to arbitrary code execution. * [CVE-2021-30744](https://security-tracker.debian.org/tracker/CVE-2021-30744) Dan Hite discovered that processing maliciously crafted web content may lead to universal cross site scripting. * [CVE-2021-30749](https://security-tracker.debian.org/tracker/CVE-2021-30749) An anonymous researcher discovered that processing maliciously crafted web content may lead to arbitrary code execution. * [CVE-2021-30758](https://security-tracker.debian.org/tracker/CVE-2021-30758) Christoph Guttandin discovered that processing maliciously crafted web content may lead to arbitrary code execution. * [CVE-2021-30795](https://security-tracker.debian.org/tracker/CVE-2021-30795) Sergei Glazunov discovered that processing maliciously crafted web content may lead to arbitrary code execution. * [CVE-2021-30797](https://security-tracker.debian.org/tracker/CVE-2021-30797) Ivan Fratric discovered that processing maliciously crafted web content may lead to code execution. * [CVE-2021-30799](https://security-tracker.debian.org/tracker/CVE-2021-30799) Sergei Glazunov discovered that processing maliciously crafted web content may lead to arbitrary code execution. For the stable distribution (buster), these problems have been fixed in version 2.32.3-1~deb10u1. We recommend that you upgrade your webkit2gtk packages. For the detailed security status of webkit2gtk please refer to its security tracker page at: [\ https://security-tracker.debian.org/tracker/webkit2gtk](https://security-tracker.debian.org/tracker/webkit2gtk)


Affected Software


CPE Name Name Version
webkit2gtk 2.24.4-1~deb10u1
webkit2gtk 2.32.2-1
webkit2gtk 2.28.1-1
webkit2gtk 2.30.6-1
webkit2gtk 2.29.3-1
webkit2gtk 2.29.1-1
webkit2gtk 2.28.2-2
webkit2gtk 2.26.4-1~bpo9+1
webkit2gtk 2.26.3-1~bpo9+1
webkit2gtk 2.26.1-2
webkit2gtk 2.28.4-1
webkit2gtk 2.24.3-1~bpo9+1
webkit2gtk 2.26.2-1~deb10+1
webkit2gtk 2.30.4-1
webkit2gtk 2.30.3-1~deb10u1
webkit2gtk 2.29.2-1
webkit2gtk 2.25.2-1
webkit2gtk 2.28.3-1
webkit2gtk 2.30.2-1
webkit2gtk 2.24.3-1
webkit2gtk 2.25.1-1
webkit2gtk 2.27.90-1
webkit2gtk 2.26.0-1
webkit2gtk 2.26.1-3~deb10u1
webkit2gtk 2.26.4-1~deb10u3
webkit2gtk 2.30.3-1
webkit2gtk 2.26.2-1
webkit2gtk 2.32.0-2
webkit2gtk 2.32.1-1
webkit2gtk 2.27.91-1
webkit2gtk 2.28.0-2~bpo10+1
webkit2gtk 2.29.4-1
webkit2gtk 2.27.3-1
webkit2gtk 2.28.2-1
webkit2gtk 2.26.4-1~deb10u1
webkit2gtk 2.26.1-3~bpo9+1
webkit2gtk 2.30.6-1~deb10u1
webkit2gtk 2.28.3-2
webkit2gtk 2.28.0-1
webkit2gtk 2.28.2-2~deb10u1
webkit2gtk 2.24.3-1~bpo10+1
webkit2gtk 2.26.1-3~bpo10+1
webkit2gtk 2.28.4-1~deb10u1
webkit2gtk 2.27.4-1
webkit2gtk 2.28.2-2~bpo10+1
webkit2gtk 2.26.1-1
webkit2gtk 2.32.1-1~deb10u1
webkit2gtk 2.31.1-1
webkit2gtk 2.30.1-1~bpo10+1
webkit2gtk 2.24.4-1~bpo10+1
webkit2gtk 2.29.91-1
webkit2gtk 2.26.4-1~bpo9+3
webkit2gtk 2.26.1-3
webkit2gtk 2.25.4-1
webkit2gtk 2.27.1-1
webkit2gtk 2.24.4-1
webkit2gtk 2.32.0-1
webkit2gtk 2.30.0-1
webkit2gtk 2.30.5-1
webkit2gtk 2.31.90-1
webkit2gtk 2.30.1-1
webkit2gtk 2.31.91-1
webkit2gtk 2.32.1-2
webkit2gtk 2.27.2-1
webkit2gtk 2.28.1-2
webkit2gtk 2.30.5-1~deb10u1
webkit2gtk 2.24.3-1~deb10u1
webkit2gtk 2.28.1-2~bpo10+1
webkit2gtk 2.29.92-1
webkit2gtk 2.26.3-1~deb10u1
webkit2gtk 2.26.2-1~bpo9+1
webkit2gtk 2.28.3-2~deb10u1
webkit2gtk 2.30.3-1+hurd.1
webkit2gtk 2.28.0-2
webkit2gtk 2.30.4-1~deb10u1
webkit2gtk 2.26.4-1~deb10u2
webkit2gtk 2.24.2-1
webkit2gtk 2.26.4-1
webkit2gtk 2.24.2-2
webkit2gtk 2.26.1-3~bpo9+2
webkit2gtk 2.26.4-1~bpo9+2
webkit2gtk 2.26.3-1~bpo10+1
webkit2gtk 2.24.4-1~bpo9+1
webkit2gtk 2.25.92-1
webkit2gtk 2.26.3-1

Related