[SECURITY] [DSA 6070-1] webkit2gtk security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-6070-1 security@debian.org
https://www.debian.org/security/ Alberto Garcia
December 04, 2025 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : webkit2gtk
CVE ID : CVE-2025-43392 CVE-2025-43425 CVE-2025-43427 CVE-2025-43429
CVE-2025-43430 CVE-2025-43431 CVE-2025-43432 CVE-2025-43434
CVE-2025-43440 CVE-2025-43443
The following vulnerabilities have been discovered in the WebKitGTK
web engine:
CVE-2025-43392
Tom Van Goethem discovered that a website may exfiltrate image
data cross-origin.
CVE-2025-43425
An anonymous researcher discovered that processing maliciously
crafted web content may lead to an unexpected process crash.
CVE-2025-43427
Gary Kwong and rheza discovered that processing maliciously
crafted web content may lead to an unexpected process crash.
CVE-2025-43429
Google Big Sleep discovered that processing maliciously crafted
web content may lead to an unexpected process crash.
CVE-2025-43430
Google Big Sleep discovered that processing maliciously crafted
web content may lead to an unexpected process crash.
CVE-2025-43431
Google Big Sleep discovered that processing maliciously crafted
web content may lead to memory corruption.
CVE-2025-43432
Hossein Lotfi discovered that processing maliciously crafted web
content may lead to an unexpected process crash.
CVE-2025-43434
Google Big Sleep discovered that processing maliciously crafted
web content may lead to an unexpected browser crash.
CVE-2025-43440
Nan Wang discovered that processing maliciously crafted web
content may lead to an unexpected process crash.
CVE-2025-43443
An anonymous researcher discovered that processing maliciously
crafted web content may lead to an unexpected process crash.
For the oldstable distribution (bookworm), these problems have been fixed
in version 2.50.2-1~deb12u1.
For the stable distribution (trixie), these problems have been fixed in
version 2.50.2-1~deb13u1.
We recommend that you upgrade your webkit2gtk packages.
For the detailed security status of webkit2gtk please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/webkit2gtk
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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=IDc+
-----END PGP SIGNATURE-----
Reply to: