![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.705060 |
Category: | Debian Local Security Checks |
Title: | Debian: Security Advisory (DSA-5060-1) |
Summary: | The remote host is missing an update for the Debian 'webkit2gtk' package(s) announced via the DSA-5060-1 advisory. |
Description: | Summary: The remote host is missing an update for the Debian 'webkit2gtk' package(s) announced via the DSA-5060-1 advisory. Vulnerability Insight: The following vulnerabilities have been discovered in the webkit2gtk web engine: CVE-2021-30934 Dani Biro discovered that processing maliciously crafted web content may lead to arbitrary code execution. CVE-2021-30936 Chijin Zhou discovered that processing maliciously crafted web content may lead to arbitrary code execution. CVE-2021-30951 Pangu discovered that processing maliciously crafted web content may lead to arbitrary code execution. CVE-2021-30952 WeBin discovered that processing maliciously crafted web content may lead to arbitrary code execution. CVE-2021-30953 VRIJ discovered that processing maliciously crafted web content may lead to arbitrary code execution. CVE-2021-30954 Kunlun Lab discovered that processing maliciously crafted web content may lead to arbitrary code execution. CVE-2021-30984 Kunlun Lab discovered that processing maliciously crafted web content may lead to arbitrary code execution. For the oldstable distribution (buster), these problems have been fixed in version 2.34.4-1~ deb10u1. For the stable distribution (bullseye), these problems have been fixed in version 2.34.4-1~ deb11u1. We recommend that you upgrade your webkit2gtk packages. For the detailed security status of webkit2gtk please refer to its security tracker page at: [link moved to references] Affected Software/OS: 'webkit2gtk' package(s) on Debian 10, Debian 11. Solution: Please install the updated package(s). CVSS Score: 9.3 CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2021-30934 Debian Security Information: DSA-5060 (Google Search) https://www.debian.org/security/2022/dsa-5060 Debian Security Information: DSA-5061 (Google Search) https://www.debian.org/security/2022/dsa-5061 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/ https://support.apple.com/en-us/HT212975 https://support.apple.com/en-us/HT212976 https://support.apple.com/en-us/HT212978 https://support.apple.com/en-us/HT212980 https://support.apple.com/en-us/HT212982 http://www.openwall.com/lists/oss-security/2022/01/21/2 Common Vulnerability Exposure (CVE) ID: CVE-2021-30936 Common Vulnerability Exposure (CVE) ID: CVE-2021-30951 Common Vulnerability Exposure (CVE) ID: CVE-2021-30952 Common Vulnerability Exposure (CVE) ID: CVE-2021-30953 Common Vulnerability Exposure (CVE) ID: CVE-2021-30954 Common Vulnerability Exposure (CVE) ID: CVE-2021-30984 Common Vulnerability Exposure (CVE) ID: CVE-2022-22594 https://support.apple.com/en-us/HT213053 https://support.apple.com/en-us/HT213054 https://support.apple.com/en-us/HT213057 https://support.apple.com/en-us/HT213058 https://support.apple.com/en-us/HT213059 Common Vulnerability Exposure (CVE) ID: CVE-2022-22637 https://support.apple.com/en-us/HT213182 https://support.apple.com/en-us/HT213183 https://support.apple.com/en-us/HT213186 https://support.apple.com/en-us/HT213187 https://support.apple.com/en-us/HT213193 |
Copyright | Copyright (C) 2022 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |