-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.4283
                        webkit2gtk security update
                             14 November 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           webkit2gtk
Publisher:         Debian
Operating System:  Debian GNU/Linux 10
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Cross-site Scripting            -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-8814 CVE-2019-8812 

Reference:         ESB-2019.4268
                   ESB-2019.4233
                   ESB-2019.4013
                   ESB-2019.4012
                   ESB-2019.4011

Original Bulletin: 
   http://www.debian.org/security/2019/dsa-4563

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4563-1                   security@debian.org
https://www.debian.org/security/                           Alberto Garcia
November 12, 2019                     https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : webkit2gtk
CVE ID         : CVE-2019-8812 CVE-2019-8814

These vulnerabilities have been discovered in the webkit2gtk web engine:

CVE-2019-8812

    An anonymous researcher discovered that maliciously crafted web
    content may lead to arbitrary code execution.

CVE-2019-8814

    Cheolung Lee discovered that maliciously crafted web content may
    lead to arbitrary code execution.

For the stable distribution (buster), these problems have been fixed in
version 2.26.2-1~deb10+1.

We recommend that you upgrade your webkit2gtk packages.

For the detailed security status of webkit2gtk please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/webkit2gtk

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAl3LJEsACgkQEMKTtsN8
Tjb/zxAAjgMXxN1SyC9XtgKA9vKPNCQhPdeeVtySs/XfQyihDpOvj1At7DU+5vG5
m/q0sro/BrgNEus2CpYdoj25tUwmONokAF0hQYLqgB02BKyYFyNeVW1utSmvhQRT
qWFLAEK+fYrxhFvWQfI+uKXr0ZDCvsgNG9ERyT9s8CistI6nZ60NbmzxDp6WmPCO
E5xZdLDdD2V+it1+74Pl78Fta/K/jTT90u88Q7friMDaQhAPlcOLjm5FSYBEo99K
eB4vpqd4o21Ypjb54t39Yq5XvDGORlLSiiW4yNZMGUFvNIB3+OJO8WJsSNIEDzeP
hlyEoTiWLK0HTeefhMTq9y5MHUSv6I4eAsWyEeqKHyPMrnSWQIvYx7ZhoVd650NL
zB+tak3Yg8KR/yMRK+E5fIcq0M7X4OpJ0R+FO8TWM9+lvN0PsJjgp9qjjXC8mkEM
m54aA6gWqNAKDbXRNsdtv5y0GOT40IS6Zn8+dczNL2Od1U8WG5FAY34rC+xIM+Bm
7z02rpiLVk62oWfqr893w9wmUwX8w+aMRN9A30Y/RhOFXavZWvu81szkkI9K1OZ2
zjX1+SITc/Zo13EbQ1LP9dnKncPNB5yCEd4rrKOrRddE9jjXK8FrNbq5qGS9jJ3+
NKTNrh/5m8oy6vJMYOnXkQiebgBWK/crK/gWbPhMHHLOiqgdTus=
=KrRQ
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBXcze7WaOgq3Tt24GAQgkPg/+PuDPymG9KvT9ilb39s+d0uWsbptil1bo
jEiViGevha5te1f9vF/OYZszt+qhd2YhaongLKie8lQ3jLkItdxVvb1wMI62sx9l
lnPlsTB+IRMWdnrenKnsS4jdN1O0G53rZKl5FmbjfTViExydzJ+8g92mJkWJAZno
mjKdQxHQ0E+SksUKEvN9kIBADrh3FlbxCiuA1tgZJZqFBG6sLRf1Zx+g0fjJtRQi
B8vaAG1Ux14V8Wl+LdcIp6VuMnnn7cXJxPKbBxBlbg4QpLSfM2Nt2iOW/PKeReMz
FTN+hPwDEfmF9XfnT2VrnmdzriCK9oHn5Vh2HYA0X5biW8glk3BRKnr0hpmI17Ea
Mb2WOTr3XlaKF8GUZ5OCB5jmYxWTFpOg+LArlUCe9asQesWqUHxIGn4Ow6sf5kL7
z2oje66buToz2fGEPR87zLkAjTwl1AMxE3SOrhyoTwSktuMPyTNaq2rHMB4xAzKx
3CRb3gAG2K9eIDiXI9fkKQnIQU1fNvcKJl10AVuTk0+3CzEnhU+8E1oR1oErf+QF
Pw+9kGTFp+zChzgd83ifb6uJsE0GE4WYhH9BmLiUnakTipBVgQRMIJGklqIkhaIr
ie1CEnh4wNLlk3AOz+OUS2SKPXtMa9vvZWU0azgvI+xO3M2QbRYFUbMUJT3wZAl2
w5ZGXp/4wIM=
=eq70
-----END PGP SIGNATURE-----