Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.704996
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-4996-1)
Summary:The remote host is missing an update for the Debian 'wpewebkit' package(s) announced via the DSA-4996-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'wpewebkit' package(s) announced via the DSA-4996-1 advisory.

Vulnerability Insight:
The following vulnerabilities have been discovered in the wpewebkit web engine:

CVE-2021-30846

Sergei Glazunov discovered that processing maliciously crafted web content may lead to arbitrary code execution

CVE-2021-30851

Samuel Gross discovered that processing maliciously crafted web content may lead to code execution

CVE-2021-42762

An anonymous reporter discovered a limited Bubblewrap sandbox bypass that allows a sandboxed process to trick host processes into thinking the sandboxed process is not confined.

For the stable distribution (bullseye), these problems have been fixed in version 2.34.1-1~
deb11u1.

We recommend that you upgrade your wpewebkit packages.

For the detailed security status of wpewebkit please refer to its security tracker page at: [link moved to references]

Affected Software/OS:
'wpewebkit' package(s) on Debian 11.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2021-30818
https://support.apple.com/en-us/HT212807
https://support.apple.com/en-us/HT212814
https://support.apple.com/en-us/HT212815
https://support.apple.com/en-us/HT212816
https://support.apple.com/en-us/HT212819
http://www.openwall.com/lists/oss-security/2021/12/20/6
Common Vulnerability Exposure (CVE) ID: CVE-2021-30823
https://support.apple.com/en-us/HT212869
Common Vulnerability Exposure (CVE) ID: CVE-2021-30846
Debian Security Information: DSA-4995 (Google Search)
https://www.debian.org/security/2021/dsa-4995
Debian Security Information: DSA-4996 (Google Search)
https://www.debian.org/security/2021/dsa-4996
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ON5SDVVPVPCAGFPW2GHYATZVZYLPW2L4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H6MGXCX7P5AHWOQ6IRT477UKT7IS4DAD/
http://seclists.org/fulldisclosure/2021/Oct/62
http://seclists.org/fulldisclosure/2021/Oct/63
http://seclists.org/fulldisclosure/2021/Oct/60
http://seclists.org/fulldisclosure/2021/Oct/61
http://www.openwall.com/lists/oss-security/2021/10/26/9
http://www.openwall.com/lists/oss-security/2021/10/27/1
http://www.openwall.com/lists/oss-security/2021/10/27/2
http://www.openwall.com/lists/oss-security/2021/10/27/4
Common Vulnerability Exposure (CVE) ID: CVE-2021-30851
http://www.openwall.com/lists/oss-security/2021/10/31/1
Common Vulnerability Exposure (CVE) ID: CVE-2021-30884
Common Vulnerability Exposure (CVE) ID: CVE-2021-30888
https://support.apple.com/en-us/HT212867
https://support.apple.com/en-us/HT212868
https://support.apple.com/en-us/HT212874
https://support.apple.com/en-us/HT212876
Common Vulnerability Exposure (CVE) ID: CVE-2021-30889
Common Vulnerability Exposure (CVE) ID: CVE-2021-42762
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M5J2LZQTDX53DNSKSGU7TQYCO2HKSTY4/
https://bugs.webkit.org/show_bug.cgi?id=231479
https://github.com/flatpak/flatpak/security/advisories/GHSA-67h7-w3jq-vh4q
Common Vulnerability Exposure (CVE) ID: CVE-2021-45481
https://github.com/ChijinZ/security_advisories/tree/master/webkitgtk-2.32.3
http://www.openwall.com/lists/oss-security/2022/01/21/2
Common Vulnerability Exposure (CVE) ID: CVE-2021-45483
CopyrightCopyright (C) 2021 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.