Lucene search

K
debianDebianDEBIAN:DSA-5527-1:E2E98
HistoryOct 12, 2023 - 7:43 p.m.

[SECURITY] [DSA 5527-1] webkit2gtk security update

2023-10-1219:43:03
lists.debian.org
35
cve-2023-39928
bullseye
arbitrary code execution
debian
mediarecorder api
cve-2023-41074
memory corruption
web content processing
debian security advisory
cve-2023-41993
bookworm
security update
webkit2gtk

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

70.5%


Debian Security Advisory DSA-5527-1 [email protected]
https://www.debian.org/security/ Alberto Garcia
October 12, 2023 https://www.debian.org/security/faq


Package : webkit2gtk
CVE ID : CVE-2023-39928 CVE-2023-41074 CVE-2023-41993

The following vulnerabilities have been discovered in the WebKitGTK
web engine:

CVE-2023-39928

Marcin Noga discovered that a specially crafted web page can abuse
a vulnerability in the MediaRecorder API to cause memory
corruption and potentially arbitrary code execution.

CVE-2023-41074

Junsung Lee and Me Li discovered that processing web content may
lead to arbitrary code execution.

CVE-2023-41993

Bill Marczak and Maddie Stone discovered that processing web
content may lead to arbitrary code execution. Apple is aware of a
report that this issue may have been actively exploited.

For the oldstable distribution (bullseye), these problems have been fixed
in version 2.42.1-1~deb11u1.

For the stable distribution (bookworm), these problems have been fixed in
version 2.42.1-1~deb12u1.

We recommend that you upgrade your webkit2gtk packages.

For the detailed security status of webkit2gtk please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/webkit2gtk

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.003

Percentile

70.5%