-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2022.4083
                         wpewebkit security update
                              17 August 2022

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           wpewebkit
Publisher:         Debian
Operating System:  Debian GNU/Linux
Resolution:        Patch/Upgrade
CVE Names:         CVE-2022-32816 CVE-2022-32792 

Original Bulletin: 
   https://lists.debian.org/debian-security-announce/2022/msg00180.html

Comment: CVSS (Max):  8.3 CVE-2022-32792 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)
         CVSS Source: SUSE
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-5211-1                   security@debian.org
https://www.debian.org/security/                           Alberto Garcia
August 16, 2022                       https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : wpewebkit
CVE ID         : CVE-2022-32792 CVE-2022-32816

The following vulnerabilities have been discovered in the WPE WebKit
web engine:

CVE-2022-32792

    Manfred Paul discovered that processing maliciously crafted web
    content may lead to arbitrary code execution.

CVE-2022-32816

    Dohyun Lee discovered that visiting a website that frames
    malicious content may lead to UI spoofing.

For the stable distribution (bullseye), these problems have been fixed in
version 2.36.6-1~deb11u1.

We recommend that you upgrade your wpewebkit packages.

For the detailed security status of wpewebkit please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wpewebkit

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=tM1k
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=kR4u
-----END PGP SIGNATURE-----