{"id":59800,"date":"2024-10-16T12:07:26","date_gmt":"2024-10-16T09:07:26","guid":{"rendered":"https:\/\/packetstormsecurity.com\/files\/182228\/dsa-5792-1.txt"},"modified":"2024-10-16T12:07:26","modified_gmt":"2024-10-16T09:07:26","slug":"debian-security-advisory-5792-1","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/debian-security-advisory-5792-1\/","title":{"rendered":"Debian Security Advisory 5792-1"},"content":{"rendered":"<p>&#8212;&#8211;BEGIN PGP SIGNED MESSAGE&#8212;&#8211;<br \/>Hash: SHA512<\/p>\n<p>&#8211; &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<br \/>Debian Security Advisory DSA-5792-1 security@debian.org<br \/>https:\/\/www.debian.org\/security\/ Alberto Garcia<br \/>October 14, 2024 https:\/\/www.debian.org\/security\/faq<br \/>&#8211; &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<\/p>\n<p>Package : webkit2gtk<br \/>CVE ID : CVE-2024-40866 CVE-2024-44187<\/p>\n<p>The following vulnerabilities have been discovered in the WebKitGTK<br \/>web engine:<\/p>\n<p>CVE-2024-40866<\/p>\n<p>Hafiizh and YoKo Kho discovered that visiting a malicious website<br \/>may lead to address bar spoofing.<\/p>\n<p>CVE-2024-44187<\/p>\n<p>Narendra Bhati discovered that a malicious website may exfiltrate<br \/>data cross-origin.<\/p>\n<p>For the stable distribution (bookworm), these problems have been fixed in<br \/>version 2.46.0-2~deb12u1.<\/p>\n<p>We recommend that you upgrade your webkit2gtk packages.<\/p>\n<p>For the detailed security status of webkit2gtk please refer to<br \/>its security tracker page at:<br \/>https:\/\/security-tracker.debian.org\/tracker\/webkit2gtk<\/p>\n<p>Further information about Debian Security Advisories, how to apply<br \/>these updates to your system and frequently asked questions can be<br \/>found at: https:\/\/www.debian.org\/security\/<\/p>\n<p>Mailing list: debian-security-announce@lists.debian.org<br \/>&#8212;&#8211;BEGIN PGP SIGNATURE&#8212;&#8211;<\/p>\n<p>iQIzBAEBCgAdFiEEYrwugQBKzlHMYFizAAyEYu0C2AIFAmcNkVcACgkQAAyEYu0C<br \/>2AIS8g\/9EKZzBT0VW5VA4kCzLSijtpyKw+kDKgVbsFQmDudoYfr1xF1syfyw1y9r<br \/>RwdUi5q2puDKenEBk1kg3xRUkVM0HCbzCVt\/h6mmx6YaBjKVAl95syXiWyDnXoOI<br \/>7e4WnzAtUgsNfx4+zpTqNdfK\/982C\/Zfc2kuit2iXiBDcCYtdBWV3+k8vbbT4Om5<br \/>2MYrbxlQlyUXEc9ZZpaAUxTvuklSQ2wHK3xtlAmoxsMdj2+Re9bOKuBuOKZkUfwU<br \/>9olgKg83HWhzc5W4u840q8oHmUrZDUpNbLjQGTSBZWVQE0uAiD8IA8k4I\/TxjPFm<br \/>MyeSRKKE0QTCOPDyHskVW+ijjcqs8pHa9\/jAwXO\/cBO6ZBkSbnQZ57j4+CQtrzA5<br \/>N0Yh02AM48898eRDXhlt2SBz+tQnlhs0vSRMacccbIy0GSlccSoiaJRsUFXZ+LOb<br \/>JiM8xlbJ8KsKJz\/pTOM6qzrIkD\/RFmqBrxIutPqsusG+XbiVQkvcQp13otfTK8Pk<br \/>hzGC47UBZuuUib8DXkYSgbb0b\/cw6\/efIwy60NpPsT7DxfjLwCyVspyQcjJplGAN<br \/>Lou0R6ezpNQu9iijjeJZR6DouiYP0YGoLm8bVo0OBIsw0tmO7vZ82SBi6Rf7ScIB<br \/>Hu190dDPt2WdNigXxpGmjk+nWyj7DncEZEfwKQb\/rZos52hPh\/Q=<br \/>=pvja<br \/>&#8212;&#8211;END PGP SIGNATURE&#8212;&#8211;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8212;&#8211;BEGIN PGP SIGNED MESSAGE&#8212;&#8211;Hash: SHA512 &#8211; &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-Debian Security Advisory DSA-5792-1 security@debian.orghttps:\/\/www.debian.org\/security\/ Alberto GarciaOctober 14, 2024 https:\/\/www.debian.org\/security\/faq&#8211; &#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;- Package : webkit2gtkCVE ID : CVE-2024-40866 CVE-2024-44187 The following vulnerabilities have been discovered in the WebKitGTKweb engine: CVE-2024-40866 Hafiizh and YoKo Kho discovered that visiting a malicious websitemay lead to address bar spoofing. CVE-2024-44187 Narendra Bhati discovered that [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-59800","post","type-post","status-publish","format-standard","hentry","category-vulnerability"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/59800","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=59800"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/59800\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=59800"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=59800"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=59800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}